2021
DOI: 10.1016/j.ijcip.2020.100394
|View full text |Cite
|
Sign up to set email alerts
|

Securing SCADA and critical industrial systems: From needs to security mechanisms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2025
2025

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…All directed node-edge diagrams and all statistical figures are demonstrated, respectively, by the Graphviz (version 0.16) and the Matplotlib (version 2.2.5). 5, which is referred from the literature [29]. It shows a simplified SCADA system whose structure is in accordance with the real-world practice.…”
Section: Case Studymentioning
confidence: 99%
“…All directed node-edge diagrams and all statistical figures are demonstrated, respectively, by the Graphviz (version 0.16) and the Matplotlib (version 2.2.5). 5, which is referred from the literature [29]. It shows a simplified SCADA system whose structure is in accordance with the real-world practice.…”
Section: Case Studymentioning
confidence: 99%
“…A security attack is any activity that risks the confidentiality or integrity of the information that belongs to a company. A security mechanism is a tool for detecting, preventing or recovering from an attack on one's system's security [2]. Information security services a service that strengthens the protection of an organization's computer systems and data flows.…”
Section: Introduction To Information and Network Securitymentioning
confidence: 99%
“…Also, the various protocols being used for communication, which include Modbus, DNP3, Profibus, etc., can be remotely targeted, via cyberattacks [4]. Apart from severe operational instabilities, failures, financial losses, etc., SCADA systems vulnerabilities and security challenges can have serious devastating consequences on nations due to their strategic importance to the various CIs [9,17,18]. As explained by the authors in [19,20], documented SCADA systems cyberattacks such as the Stuxnet, Aurora, etc.…”
Section: Introductionmentioning
confidence: 99%