SP 800-82. Guide to Industrial Control Systems (ICS) Security: Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC)

@inproceedings{Stouffer2011SP8G,
  title={SP 800-82. Guide to Industrial Control Systems (ICS) Security: Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC)},
  author={Keith A. Stouffer and Joseph Falco and Karen Scarfone},
  year={2011}
}
The purpose of this document is to provide guidance for securing industrial control systems (ICS), including supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other systems performing control functions. The document provides an overview of ICS and typical system topologies, identifies typical threats and vulnerabilities to these systems, and provides recommended security countermeasures to mitigate the associated risks. Because there are many… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 33 CITATIONS

Cyber-Physical Systems Security—A Survey

  • IEEE Internet of Things Journal
  • 2017
VIEW 5 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Optimizing internet scanning for assessing industrial systems exposure

  • 2016 International Wireless Communications and Mobile Computing Conference (IWCMC)
  • 2016
VIEW 11 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Risk Analysis as a Security Metric for Industrial Control Systems

VIEW 10 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

A low-delay SDN-based countermeasure to eavesdropping attacks in industrial control systems

  • 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)
  • 2017
VIEW 3 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

NIPAD: a non-invasive power-based anomaly detection scheme for programmable logic controllers

  • Frontiers of Information Technology & Electronic Engineering
  • 2017
VIEW 3 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED