2017 2nd International Conference on Anti-Cyber Crimes (ICACC) 2017
DOI: 10.1109/anti-cybercrime.2017.7905261
|View full text |Cite
|
Sign up to set email alerts
|

Security issues in SCADA based industrial control systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 55 publications
(27 citation statements)
references
References 8 publications
0
26
0
1
Order By: Relevance
“…IEC 62443 assists the IT/OT convergence but the standard itself is complex and leads to alignment issues. Some of the issues related to IT/OT convergence are discussed in [ 14 , 18 , 19 , 60 , 98 ]. They include outdated legacy systems with custom configurations and limited security, different security levels for IT/OT, increased security stakes, and IT/OT accountability and productivity risks.…”
Section: It/ot Convergence and Issuesmentioning
confidence: 99%
“…IEC 62443 assists the IT/OT convergence but the standard itself is complex and leads to alignment issues. Some of the issues related to IT/OT convergence are discussed in [ 14 , 18 , 19 , 60 , 98 ]. They include outdated legacy systems with custom configurations and limited security, different security levels for IT/OT, increased security stakes, and IT/OT accountability and productivity risks.…”
Section: It/ot Convergence and Issuesmentioning
confidence: 99%
“…The effects of the vulnerabilities in the hardware, software, network or their operational configuration manifest in the form of security threats. An interesting overview of the major threats to SCADA systems is provided by Babu et al [10] in the following order: zero day vulnerabilities, lack of task prioritization, database injections, and last, communication protocol issues.…”
Section: Related Workmentioning
confidence: 99%
“…Babu et al [10] Review and analysis of security vulnerabilities affecting SCADA systems only, highlighting the current security risks targeting the communication protocols.…”
Section: ---mentioning
confidence: 99%
“…SCADA security systems are vulnerable to attacks on hardware, software, and communication protocols. In [25], as major vulnerabilities for SCADA automation systems, the following were identified: “zero-day” vulnerabilities, lack of task prioritization, database injection, and issues at communication protocol level. Additionally, in [26], the vulnerabilities are highlighted at the level of interaction with HMI (Human-Machine Interface): cross-site scripting, the existence of unused ports and services, vulnerabilities which are allowing unauthorized writings leading to buffer overflow.…”
Section: Related Workmentioning
confidence: 99%