Analysis of Security of SCADA System

Article Preview

Abstract:

SCADA (Supervisory Control and Data Acquisition) is an important concern about national security of our country and its security professionals. During those early days, a so called "security by obscurity" helped provide a palpable layer of cyber security and defense and a general feeling of immunity kinds of security problems that have started emerging networks to emerge in the mid 1980's, starting with the known Morris Worm. However, with the global standardization of TCP/IP protocol, and for the past 20 years, with the migration of autonomous systems SCADA interconnected power grids, security risks have increased exponentially. The security officials can no longer rely on the isolated nature of these systems to provide protection. Unfortunately, the security of SCADA systems has not kept pace with advances in computer technology. According to a 2003 report by Sandia National Laboratories, the SCADA security is generally five to ten years behind compared to typical systems of information technology. As threat, the contradictory range has expanded to include not only domestic but foreign terrorists, disgruntled internal, organized crime and even international competitors. This volatile convergence of global computer network and critical weaknesses in the operating system and application software system are well understood by opponents. Although a catastrophic failure is unlikely, these risks could be very problematic and cause disruptions in essential services and billions of euros in losses. This study includes a description of the state of the art of attacks against these systems and the reasons for the vulnerability of these systems. [1, 2, 3]

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1417-1421

Citation:

Online since:

June 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Robert McMillan, Siemens: Stuxnet worm hit industrial systems, Computerworld(2010).

Google Scholar

[2] White Paper on Industrial Network Security System, U.S. National Security Agency Information Systems (2012).

Google Scholar

[3] Eric Semaan: Security of Industrial Systems, Telecom ParisTech (2013).

Google Scholar

[4] Kaspersky Lab-depth analysis of Stuxnet worm, Kaspersky Lab (2010).

Google Scholar

[5] Eric Knapp: Industrial Network Security Securing Critical Infrastructure Networks for Smart Grid, SCADA and Other Industrial Control Systems (2011).

Google Scholar

[6] Jack Wiles: Techno Security's Guide to Securing SCADA (2009).

Google Scholar