Cyber security architectures for ICS/supervisory control and data acquisition environments

2012 ◽  
Vol 1 (1) ◽  
Author(s):  
Adam Wedgbury ◽  
Kevin Jones
2020 ◽  
Vol 5 (7) ◽  
pp. 785-789
Author(s):  
Job Asheri Chaula ◽  
Godfrey Weston Luwemba

The primary purpose of this research was to assess the adequacy and effectiveness of security control of the Supervisory Control and Data Acquisition (SCADA) communication network used by infrastructure companies. Initially, the SCADA networks were physically separated from other networks connected to the internet and hence assumed secure. However, the modern SCADA are now integrated with other network resulting in new security vulnerabilities and attacks similar to those found in traditional IT. Thus, it is important to reassess the security controls of the SCADA because it is operated in an open network environment. In this research, a case of the SCADA security controls in the power sector in Tanzania was assessed, whereby a specific SCADA implementation was studied. The data were gathered using observation, testing, interviews, questionnaire and documentation reviews. The results were analyzed using the Cyber Security Evaluation Tool (CSET) and checked for compliance based on the National Institute of Standards and Technology (NIST) and North America Electric Reliability Corporation (NERC) standards. The findings have shown that there exist security vulnerabilities both in security compliance of the standard and component-based vulnerabilities. Additionally, there is inadequate of audit and accountability, personnel security and system and information integrity. Also, for the component-based security compliance, the finding shows that identification and authentication, security management and audit and accountability. On the basis of the results, the research has indicated the areas that require immediate action in order to protect the critical infrastructure.


2016 ◽  
Vol 6 (1) ◽  
pp. 59
Author(s):  
Ahmad Budi Setiawan

<p class="Abstract"><em><span lang="EN-US">SCADA (Supervisory Control and Data Acquisition) systems as the control unit of the smart grid has been used in almost various industries around the world in terms of automation systems. Smart grid technology combines the energy infrastructure and telecommunications and Internet networks. The system provides the operational ease and efficiency in the industry. However, the system has a lot of vulnerabilities in information security aspects that can have a major impact for the industry and even the economy. This study tried to design in building a smart grid cyber security, it includes the strategies that must be done and the information security system architecture to be built. The study was conducted qualitative in-depth interviews, focus group discussions and direct observation. Results of this research is the design strategy recommendations ddalam development of smart grid cyber security. Recommendation results of this study also intended as a suggestion-making framework for smart grid cyber security as a reference implementation of the smart grid in Indonesia.</span></em></p>


2013 ◽  
Vol 33 (2) ◽  
pp. 567-570
Author(s):  
Zeping YANG ◽  
Deqiang LIU ◽  
Qian WANG ◽  
Qiangming XIANG

Sign in / Sign up

Export Citation Format

Share Document