Securing Water and Wastewater Systems 2013
DOI: 10.1007/978-3-319-01092-2_3
|View full text |Cite
|
Sign up to set email alerts
|

Industrial Control System (ICS) Cyber Security for Water and Wastewater Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(30 citation statements)
references
References 0 publications
0
30
0
Order By: Relevance
“…Increasingly, however, SCADA and business networks of most medium-to large-scale PWSs are inter-connected to provide integrated operation. If such integration is not secured, it will generally lead to greater vulnerability; this is very important to the water sector because it is thought to lag behind most other CIs in securing its control systems (Baker et al 2010;Weiss 2014). The top five areas of common security gaps in water supply are: (1) network configurations, (2) media protection, (3) remote access, (4) documented policies and procedures, and (5) trained staff.…”
Section: Common Vulnerabilities In the Water Supply Industrymentioning
confidence: 99%
See 1 more Smart Citation
“…Increasingly, however, SCADA and business networks of most medium-to large-scale PWSs are inter-connected to provide integrated operation. If such integration is not secured, it will generally lead to greater vulnerability; this is very important to the water sector because it is thought to lag behind most other CIs in securing its control systems (Baker et al 2010;Weiss 2014). The top five areas of common security gaps in water supply are: (1) network configurations, (2) media protection, (3) remote access, (4) documented policies and procedures, and (5) trained staff.…”
Section: Common Vulnerabilities In the Water Supply Industrymentioning
confidence: 99%
“…Cyber-impacts may also have process impacts depending on the process and system design. For instance, if attackers change database parameters in the real-time database (impacts system integrity), they could turn on pumps potentially causing a tank to overflow as illustrated by the successful attack against the wastewater treatment plant in the Maroochy Shire in Queensland, Australia (Panguluri et al 2004;Janke et al 2014;Weiss 2014).…”
Section: Common Vulnerabilities In the Water Supply Industrymentioning
confidence: 99%
“…In case of ICS, social impact due to threats and vulnerabilities like hacking, natural disaster, and internal problems for system cannot compare with general information systems and has great damage that brings out severe economic and social dislocation [5].…”
Section: Safety Risk Analysis Of Power Icsmentioning
confidence: 99%
“…Many ICSs and devices are connected to the Internet [Andreeva, Gordeychik, Gritsai et al (2016)] and show an increasing trend year over year [Xu, Tao and Guan (2018)]. Because ICSs are different from traditional IT systems [Stouffer, Falco and Scarfone (2011)], traditional security solutions cannot completely solve ICS security problems [Weiss (2008)]. In addition, ICSs control the actual physical process.…”
Section: Introductionmentioning
confidence: 99%