An examination of the security implications of the supervisory control and data acquisition (SCADA) system in a mobile networked environment: An augmented vulnerability tree approach.

Tanu, Eedee and Arreymbi, Johnnes (2010) ‘An examination of the security implications of the supervisory control and data acquisition (SCADA) system in a mobile networked environment: An augmented vulnerability tree approach.’, Proceedings of Advances in Computing and Technology, (AC&T) The School of Computing and Technology 5th Annual Conference, University of East London, pp. 228-242.

[img]
Preview
Text
Tanu, E (2010) AC&T 228.pdf - Published Version
Available under License Creative Commons Attribution No Derivatives.

Download (397Kb) | Preview

Abstract

The increasing demand of supervisory control systems connected remotely to critical infrastructure and recently the internet, has profiled a high threat level to the security and function of control system; more especially Supervisory Control and Data Acquisition (SCADA) systems. It is very crucial that operators and management are knowledgeable about these threats and get familiarize with ways to trace and track information required mitigating the threats. In present day very competitive markets and with high levels of infrastructural investments, it is of vital importance for corporations to be up-to-date with their SCADA networks so as to meet the challenges faced by remote and/or mobile access, use and cyber threat posed to the critical systems infrastructures. We have examined the security implications of having the SCADA system exposed to the mobile and/or internet environment. The paper deals with the following issues: Section one looks at types of infrastructures and the general functionalities of SCADA and assesses the risks in mobile environment. The second section employs some of the recent methodologies applied to the SCADA system. Section three reports on some findings from analysis and critically evaluates the risks posed to the system using an augmented vulnerability tree approach. The last section draws from the findings to re-evaluate, conclude and proposes some solutions on the risk issues of operating SCADA in a mobile networked environment.

Item Type: Conference or Event Item (Paper)
Additional Information: Citation: Tanu, E. and Arreymbi, J. (2010) ‘An examination of the security implications of the supervisory control and data acquisition (SCADA) system in a mobile networked environment: An augmented vulnerability tree approach.’, Proceedings of Advances in Computing and Technology, (AC&T) The School of Computing and Technology 5th Annual Conference, University of East London, pp.228-242..
Divisions: Schools > Architecture Computing and Engineering, School of
Depositing User: Mr Stephen Grace
Date Deposited: 15 Sep 2010 10:33
Last Modified: 27 Sep 2012 11:59
URI: http://hdl.handle.net/10552/994

Actions (login required)

View Item View Item