Journal of Information Security

Volume 9, Issue 1 (January 2018)

ISSN Print: 2153-1234   ISSN Online: 2153-1242

Google-based Impact Factor: 3.79  Citations  

A Security Architecture for SCADA Systems

HTML  XML Download Download as PDF (Size: 852KB)  PP. 100-132  
DOI: 10.4236/jis.2018.91009    1,321 Downloads   3,765 Views  Citations

ABSTRACT

Supervisory Control and Data Acquisition (SCADA) systems are attractive targets for attackers, as they offer an avenue to attack critical infrastructure (CI) systems controlled by SCADA systems. Ultimately, an attack on any system exploits some undesired (malicious or accidental) functionality in the components of the system. Unfortunately, it is far from practical to eliminate undesired functionality in every component of a system. The contribution of this paper is a novel architecture for securing SCADA systems that guarantee that “any malicious modification of the deployment configuration or the design configuration of the SCADA system will be detected”—even if undesired functionality may exist in SCADA system components.

Share and Cite:

Velagapalli, A. and Ramkumar, M. (2018) A Security Architecture for SCADA Systems. Journal of Information Security, 9, 100-132. doi: 10.4236/jis.2018.91009.

Cited by

[1] “Солнечная” SCADA
2020

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.