Vulnerability Assessment of Cyber Security for SCADA Systems

  • Coffey K
  • Maglaras L
  • Smith R
  • et al.
N/ACitations
Citations of this article
22Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Supervisory control and data acquisition (SCADA) systems use programmable logic controllers (PLC) or other intelligent electronic devices (IED), remote terminal units (RTU) and input/output (I/O) devices to manage electromechanical equipment in either local or distributed environments. SCADA systems cover a range of industrial sectors and critical infrastructures such as water treatment and supply, electricity generation and distribution, oil refining, food production and logistics. Several factors have contributed to the escalation of risks specific to control systems, including the adoption of standardized technologies with known vulnerabilities, interconnectivity with other networks, use of insecure remote connections and widespread availability of technical information about control systems. This chapter discusses vulnerability assessment of SCADA systems, focusing on several aspects such as asset discovery, identification of vulnerabilities and threats, mitigation of attacks and presentation of major privacy issues.

Cite

CITATION STYLE

APA

Coffey, K., Maglaras, L. A., Smith, R., Janicke, H., Ferrag, M. A., Derhab, A., … Yousaf, A. (2018). Vulnerability Assessment of Cyber Security for SCADA Systems (pp. 59–80). https://doi.org/10.1007/978-3-319-92624-7_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free