{"title":"开发可靠的SCADA安全策略","authors":"J. Pollet","doi":"10.1109/SFICON.2002.1159826","DOIUrl":null,"url":null,"abstract":"This paper will discuss how the level of hacking has risen in recent years, and some of the existing vulnerability assessments that have been recorded and discussed by several organizations. It will then step through a series of strategies for designing \"Rings of Defense\" around your corporate networking and SCADA infrastructure. The section on \"Developing a SCADA Security Strategy\" has been compiled through many sources, and these strategies can be considered as \"Best Practices\". This paper will then describe specific threats to SCADA Systems and some sample hacking scenarios, and then rank these threats in a security matrix. The following sections after the security matrix describe why security for SCADA systems and control systems are typically overlooked, and what steps should be taken when considering SCADA Security.","PeriodicalId":294424,"journal":{"name":"2nd ISA/IEEE Sensors for Industry Conference,","volume":"259 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2002-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"61","resultStr":"{\"title\":\"Developing a solid SCADA security strategy\",\"authors\":\"J. Pollet\",\"doi\":\"10.1109/SFICON.2002.1159826\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper will discuss how the level of hacking has risen in recent years, and some of the existing vulnerability assessments that have been recorded and discussed by several organizations. It will then step through a series of strategies for designing \\\"Rings of Defense\\\" around your corporate networking and SCADA infrastructure. The section on \\\"Developing a SCADA Security Strategy\\\" has been compiled through many sources, and these strategies can be considered as \\\"Best Practices\\\". This paper will then describe specific threats to SCADA Systems and some sample hacking scenarios, and then rank these threats in a security matrix. The following sections after the security matrix describe why security for SCADA systems and control systems are typically overlooked, and what steps should be taken when considering SCADA Security.\",\"PeriodicalId\":294424,\"journal\":{\"name\":\"2nd ISA/IEEE Sensors for Industry Conference,\",\"volume\":\"259 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2002-11-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"61\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2nd ISA/IEEE Sensors for Industry Conference,\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SFICON.2002.1159826\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2nd ISA/IEEE Sensors for Industry Conference,","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SFICON.2002.1159826","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
This paper will discuss how the level of hacking has risen in recent years, and some of the existing vulnerability assessments that have been recorded and discussed by several organizations. It will then step through a series of strategies for designing "Rings of Defense" around your corporate networking and SCADA infrastructure. The section on "Developing a SCADA Security Strategy" has been compiled through many sources, and these strategies can be considered as "Best Practices". This paper will then describe specific threats to SCADA Systems and some sample hacking scenarios, and then rank these threats in a security matrix. The following sections after the security matrix describe why security for SCADA systems and control systems are typically overlooked, and what steps should be taken when considering SCADA Security.