Corpus ID: 45746045

The Myths and Facts behind Cyber Security Risks for Industrial Control Systems

@inproceedings{Byres2004TheMA,
  title={The Myths and Facts behind Cyber Security Risks for Industrial Control Systems},
  author={E. Byres and P. Eng and J. Lowe},
  year={2004}
}
  • E. Byres, P. Eng, J. Lowe
  • Published 2004
  • Process control and SCADA systems, with their reliance on proprietary networks and hardware, have long been considered immune to the network attacks that have wreaked so much havoc on corporate information systems. Unfortunately, new research indicates this complacency is misplaced – the move to open standards such as Ethernet, TCP/IP and web technologies is letting hackers take advantage of the control industry’s ignorance. This paper summarizes the incident information collected in the BCIT… CONTINUE READING
    241 Citations

    Figures from this paper.

    Industrial cybersecurity for power system and SCADA networks
    • A. Creery, E.J. Byres
    • Engineering
    • Record of Conference Papers Industry Applications Society 52nd Annual Petroleum and Chemical Industry Conference
    • 2005
    • 82
    INDUSTRIAL CYBERSECURITY FOR POWER SYSTEM AND SCADA
    • 2015
    Securing Supervisory Control and Data Acquisition Systems: Factors and Research Direction
    • 1
    Industrial cybersecurity for a power system and SCADA networks - Be secure
    • 48
    Internal security attacks on SCADA systems
    • 18
    • Highly Influenced
    Creating a European SCADA Security Testbed
    • 46
    • PDF
    Security issues in SCADA networks
    • 517
    • Highly Influenced
    • PDF
    Secure Management of SCADA Networks
    • 16
    • PDF
    Addressing IT Security for Critical Control Systems
    • M. Naedele
    • Computer Science
    • 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07)
    • 2007
    • 54
    • PDF
    Applying Trusted Network Technology To Process Control Systems
    • 10
    • PDF

    References

    SHOWING 1-3 OF 3 REFERENCES
    Assessing and Exploiting the Internal Security of an Organization
    • The SANS Institute, March
    • 2001
    Debunking the Threat to Water Utilities
    • CIO Magazine, CXO Media Inc., March
    • 2002
    Hackers bigger threat than rogue staff
    • VNU Publications,
    • 2003