An Introduction to SCADA-ICS System Security. Technical Report March, 2013.
An Introduction to SCADA-ICS System Security [link]Paper  abstract   bibtex   
In order to be effective, industrial critical infrastructures have to be managed remotely from central control rooms, using computers and networks. From running air-conditioning to operating a lift in a building – these processes all require 'supervisory control and data acquisition', which is known as SCADA technology. SCADA for Industrial Control Systems has become a topic of concern from a security perspective since these technologies control much of the infrastructure that we rely on in our everyday life: from power generation, to railway signalling networks and aircraft management. They all rely on networked, interconnected control systems. Historically, the threat to these systems was minimal because the protocols used by SCADA/ICS systems were bespoke, and local. However, as standardisation has created interoperable equipments and networking technology has migrated towards IP connectivity, SCADA/ICS systems are now accessible, and increasingly, attackable from the Internet.
@techreport{ _introduction_2013,
  type = {Whitepaper},
  title = {An {Introduction} to {SCADA}-{ICS} {System} {Security}},
  url = {http://www.iguanasecurity.com/blogs/an-introduction-to-scada-ics-system-security-whitepaper.aspx},
  abstract = {In order to be effective, industrial critical infrastructures have to be managed remotely from central control rooms, using computers and networks.  From running air-conditioning to operating a lift in a building – these processes all require  'supervisory control and data acquisition', which is known as SCADA technology.  

SCADA for Industrial Control Systems has become a topic of concern from a security perspective since these technologies control much of the infrastructure that we rely on in our everyday life: from power generation, to railway signalling networks and aircraft management. They all rely on networked, interconnected control systems.

Historically, the threat to these systems was minimal because the protocols used by SCADA/ICS systems were bespoke, and local. However, as standardisation has created interoperable equipments and networking technology has migrated towards IP connectivity, SCADA/ICS systems are now accessible, and increasingly, attackable from the Internet.},
  month = {March},
  year = {2013}
}

Downloads: 0