Record of Conference Papers Industry Applications Society 52nd Annual Petroleum and Chemical Industry Conference
DOI: 10.1109/pcicon.2005.1524567
|View full text |Cite
|
Sign up to set email alerts
|

Industrial Cybersecurity for Power System and Scada Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
40
0

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 57 publications
(40 citation statements)
references
References 0 publications
0
40
0
Order By: Relevance
“…Cyber vulnerabilities that exist in the SCADA systems are discussed in [6]. Through remote access points of a communication system, attackers may be able to disrupt communications, monitor system status, access critical data (e.g., operating plan, the topology of installed protection systems, passwords and measurement records), inject malicious control commands and inject falsified data into a control center.…”
Section: Supervisory Control and Data Acquisition Systemmentioning
confidence: 99%
“…Cyber vulnerabilities that exist in the SCADA systems are discussed in [6]. Through remote access points of a communication system, attackers may be able to disrupt communications, monitor system status, access critical data (e.g., operating plan, the topology of installed protection systems, passwords and measurement records), inject malicious control commands and inject falsified data into a control center.…”
Section: Supervisory Control and Data Acquisition Systemmentioning
confidence: 99%
“…To ensure that SCADA systems are well maintained, security measures should be given special importance [69]. Attacks on the SCADA system can cause threat to people's safety, a loss of productivity, and even some environmental damage [69].…”
Section: Scada Architecturementioning
confidence: 99%
“…Attacks on the SCADA system can cause threat to people's safety, a loss of productivity, and even some environmental damage [69]. Some basic network systems (e.g., ports, hubs, switches, routers, firewalls, and the Simple Network Management Protocol (SNMP)) are also general, electrical power grid components that are at risk of being attacked.…”
Section: Scada Architecturementioning
confidence: 99%
“…Adam and Byres presented an interesting high level analysis of the possible threats affecting a power plant system, a categorization of the typical hardware devices involved and some high level discussion about intrinsic vulnerabilities of the common power plant architectures in Creery and Byres (2005). A more detailed work on the topic of SCADA security, is presented in Chandia et al (2007).…”
Section: Ics Security Overviewmentioning
confidence: 99%