2007
DOI: 10.1016/j.isatra.2007.04.003
|View full text |Cite
|
Sign up to set email alerts
|

Cyber security risk assessment for SCADA and DCS networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
91
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 215 publications
(92 citation statements)
references
References 29 publications
1
91
0
Order By: Relevance
“…Since the TA architecture considers issues across each OTI viewpoint, the inclusion or adaptation of any method that could support them was vital. While existing methods [23][24][25][26][27] provide interesting insight into the assessment of security, it appears some may face challenges when considering multiple OTI viewpoints. Through basic adaptation, the method in [28] appears to provide a good starting point.…”
Section: Case Studymentioning
confidence: 99%
“…Since the TA architecture considers issues across each OTI viewpoint, the inclusion or adaptation of any method that could support them was vital. While existing methods [23][24][25][26][27] provide interesting insight into the assessment of security, it appears some may face challenges when considering multiple OTI viewpoints. Through basic adaptation, the method in [28] appears to provide a good starting point.…”
Section: Case Studymentioning
confidence: 99%
“…Due to the evolution of technology, the advanced version of DNP3 provides interconnectivity over the Internet; the information travels through non-proprietary protocols, which reside below DNP3 [5,19]. Due to open connectivity, DNP3 has been vulnerable to Internet attacks; most DNP3 devices are configured, and communicate without any proper authentication mechanism or have little protection in the SCADA network against vulnerabilities [23][24][25][26][27][28][29][30]. Cryptography based security mechanisms [31] have been proposed for DNP3 by DNP3 users group, in which symmetric and asymmetric methods are defined and a detailed description of challenge-response technique is made to examine the security goals (or parameters), such as authentication and integrity, and to protect the transmission against attacks, such as replay, spoofing, and modification attacks [8,32,33], at the application layer.…”
Section: Background Studymentioning
confidence: 99%
“…• Hackers can intrude, modify, destroy or exfiltrate data thereby causing disruption to systems and networks [17,21] and/or DoS.…”
Section: Cyber Vulnerabilities In Scada Systemsmentioning
confidence: 99%
“…Availiability Confidentiality infrastructures [16], include the risks from loss of service (e.g., electricity, traffic or process control), financial sector services, property and environmental damage and potential loss of life [17].…”
mentioning
confidence: 99%