{"title":"Process Control Security Journey","authors":"D. Hagedorn, B. Honda, D. Peterson","doi":"10.1109/PAPCON.2007.4286292","DOIUrl":null,"url":null,"abstract":"The issues associated with computer security are no longer the exclusive domain of information technology. The increasing use of commercial off-the-shelf (COTS) technologies in process control systems and networks makes them a potential target for various kinds of cyber attacks. The potential damage that can be caused if an attack is successful against a process control system can be substantial, if not catastrophic. Not only can production be impacted, but more importantly, safety can be compromised. It is therefore imperative that manufacturers understand the nature of potential threats, and that processes be put in place to prevent incidents as well as to deal with those that do occur. This paper will discuss one company's approach to understanding the nature of these threats, the risks associated with these threats, the business value of implementing a secure business to process architecture, and the experience gained by dealing with process control security. Discussed will be technology issues, organizational implications, and the recommended processes to put into place to insure that risks are minimized.","PeriodicalId":435177,"journal":{"name":"Conference Record of 2007 Annual Pulp and Paper Industry Technical Conference","volume":"111 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Conference Record of 2007 Annual Pulp and Paper Industry Technical Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PAPCON.2007.4286292","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The issues associated with computer security are no longer the exclusive domain of information technology. The increasing use of commercial off-the-shelf (COTS) technologies in process control systems and networks makes them a potential target for various kinds of cyber attacks. The potential damage that can be caused if an attack is successful against a process control system can be substantial, if not catastrophic. Not only can production be impacted, but more importantly, safety can be compromised. It is therefore imperative that manufacturers understand the nature of potential threats, and that processes be put in place to prevent incidents as well as to deal with those that do occur. This paper will discuss one company's approach to understanding the nature of these threats, the risks associated with these threats, the business value of implementing a secure business to process architecture, and the experience gained by dealing with process control security. Discussed will be technology issues, organizational implications, and the recommended processes to put into place to insure that risks are minimized.