{"title":"SCADA system security: Complexity, history and new developments","authors":"Ning Cai, Jidong Wang, Xinghuo Yu","doi":"10.1109/INDIN.2008.4618165","DOIUrl":null,"url":null,"abstract":"Over the last decade, efforts from industries and research communities have been made in addressing the security of Supervisory Control and Data Acquisition (SCADA) systems. However, the SCADA security deployed for critical infrastructures is still a challenging issue today. This paper gives an overview of the complexity of SCADA security. Products and applications in control network security are reviewed. Furthermore, new developments in SCADA security, especially the trend in technical and theoretical studies are presented. Some important topics on SCADA security are identified and highlighted and this can be served as the guide for future works in this area.","PeriodicalId":112553,"journal":{"name":"2008 6th IEEE International Conference on Industrial Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"68","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 6th IEEE International Conference on Industrial Informatics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INDIN.2008.4618165","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 68
Abstract
Over the last decade, efforts from industries and research communities have been made in addressing the security of Supervisory Control and Data Acquisition (SCADA) systems. However, the SCADA security deployed for critical infrastructures is still a challenging issue today. This paper gives an overview of the complexity of SCADA security. Products and applications in control network security are reviewed. Furthermore, new developments in SCADA security, especially the trend in technical and theoretical studies are presented. Some important topics on SCADA security are identified and highlighted and this can be served as the guide for future works in this area.