Mapping water sector cyber-security vulnerabilities

3Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.

Abstract

This paper identifies, characterizes, maps, and prioritizes cyber-vulnerabilities in the industrial control systems which are used throughout the Water Sector (includes both drinking water and wastewater treatment facilities). This report discusses both technical vulnerabilities and business/operational challenges, with concentration on the technical issues. The priority order is based upon the research team's review of the "Road Map to Secure Control Systems in the Water Sector," DHS Control Systems Security Program documents, a CSET-CS2SAT evaluation, and from comments by the project advisory board and individual discussion with water sector personnel. Related and relevant on-going research for cyber-security vulnerabilities is included, along with identified needed additional research for each vulnerability area.

Cite

CITATION STYLE

APA

Graham, J. H., Hieb, J. L., & Foreman, J. C. (2011). Mapping water sector cyber-security vulnerabilities. In Proceedings of the ISCA 24th International Conference on Computer Applications in Industry and Engineering, CAINE 2011 (pp. 298–304).

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free