The SCADA Threat Landscape
نویسنده
چکیده
Nations around the world rely on the correct and continued functioning of industrial control systems (ICS) to keep economies moving and provide critical services such as electricity and clean water. This paper provides an analysis of the current threat landscape facing ICS. Discussion is provided on the actors involved, their motivations, and specific attack vectors they may use to reach their goals.
منابع مشابه
Not all SCADA is Equal: Impact of Control Models on ICS Threat Landscape
There are almost as many ways to implement Industrial Control Systems as there are ways to control industrial systems. This produces a wide-varying range of possible architectures for the SCADA networks that control them. This paper organizes SCADA networks based on these various control architectures in order to evaluate how different control models and architectures can affect the threat mode...
متن کاملیک سامانه مدیریت دسترسی برای کاهش تهدیدهای عملیاتی در سامانه اسکادا
One of the most dangerous insider threats in a supervisory control and data acquisition (SCADA) system is the operational threat. An operational threat occurs when an authorized operator misuses the permissions, and brings catastrophic damages by sending legitimate control commands. Providing too many permissions may backfire, when an operator wrongly or deliberately abuses the privileges. Ther...
متن کاملSCADA Cyber Attacks and Security Vulnerabilities: Review
SCADA plays a vital role in critical infrastructures. As the modern IT technology become very advanced, the threat on industrial control system (ICS) and SCADA security become a big concern of every critical infrastructures operator. With the recent cyber-attacks, the urge to secure the critical infrastructure is a big issue especially for those countries that uses critical infrastructures. In ...
متن کاملIncident Analysis & Digital Forensics in SCADA and Industrial Control Systems
SCADA and industrial control systems have been traditionally isolated in physically protected environments. However, developments such as standardisation of data exchange protocols and increased use of IP, emerging wireless sensor networks and machine-to-machine communication mean that in the near future related threat vectors will require consideration too outside the scope of traditional SCAD...
متن کاملSafeguarding Australia from Cyber-terrorism:A Proposed Cyber-terrorism SCADA Risk Framework for Industry Adoption
Terrorist groups are currently using information and communication technologies (ICTs) to orchestrate their conventional physical attacks. More recently, terrorists have been developing a new form of capability within the cyber-arena to coordinate cyber-based attacks. This paper identifies that cyber-terrorism capabilities are an integral, imperative, yet under-researched component in establish...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013