Assessing and augmenting SCADA cyber security: a survey of techniques

Sajid Nazir*, Shushma Patel, Dilip Patel

*Corresponding author for this work

    Research output: Contribution to journalArticle

    803 Downloads (Pure)

    Abstract

    SCADA systems monitor and control critical infrastructures of national importance such as power generation and distribution, water supply, transportation networks, and manufacturing facilities. The pervasiveness, miniaturisations and declining costs of Internet connectivity have transformed these systems from strictly isolated to highly interconnected networks. The connectivity provides immense benefits such as reliability, scalability and remote connectivity, but at the same time exposes an otherwise isolated and secure system, to global cyber security threats. This inevitable transformation to highly connected systems thus necessitates effective security safeguards to be in place as any compromise or downtime of SCADA systems can have severe economic, safety and security ramifications. One way to ensure vital asset protection is to adopt a viewpoint similar to an attacker to determine weaknesses and loopholes in defences. Such mind sets help to identify and fix potential breaches before their exploitation. This paper surveys tools and techniques to uncover SCADA system vulnerabilities. A comprehensive review of the selected approaches is provided along with their applicability.
    Original languageEnglish
    Pages (from-to)436-454
    Number of pages19
    JournalComputers & Security
    Volume70
    Early online date5 Jul 2017
    DOIs
    Publication statusPublished - Sep 2017

    Keywords

    • SCADA systems
    • cyber security

    Fingerprint Dive into the research topics of 'Assessing and augmenting SCADA cyber security: a survey of techniques'. Together they form a unique fingerprint.

  • Profiles

    Cite this