Information Security Evaluation of the Key Equipment in Industrial Control Systems

Article Preview

Abstract:

This paper analyzes the information security risks faced by the industrial control systems, Propose the Information Security Evaluation on industrial control system based on the level protection assessment technology, The development of industrial control system from the device level , field-level and system-level three levels of information security evaluation, propose the next step in the research program.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1640-1644

Citation:

Online since:

July 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Information on http: /soft. yesky. com.

Google Scholar

[2] Information on http: /www. iec. ch.

Google Scholar

[3] Information on http: /www. miit. gov. cn.

Google Scholar

[4] Security issues in SCADA networks, Computers & Security, Volume 25, Issue 7, October 2006, Pages 498–506.

Google Scholar

[5] Sullivan K. Information security practices for industrial control systems. (2011).

Google Scholar

[6] Stouffer K, Falco J, Scarfone K. Guide to industrial control systems (ICS) security [J]. NIST Special Publication, 2008, 800: 82.

Google Scholar

[7] Dzung D, Naedele M, Von Hoff T P, et al. Security for industrial communication systems[J]. Proceedings of the IEEE, 2005, 93(6): 1152-1177.

DOI: 10.1109/jproc.2005.849714

Google Scholar

[8] Stouffer K, Falco J, Scarfone K. Guide to industrial control systems (ICS) security[J]. NIST Special Publication, 2008, 800: 82.

Google Scholar