Systematization of industrial control systems information security threats

2021 ◽  
Author(s):  
Julia Kuznetsova ◽  
Konstantin Sakharov ◽  
Igor Salov ◽  
Vladislav Kemkin ◽  
Boris Doroshenko ◽  
...  
Author(s):  
Rafal Leszczyna ◽  
Elyoenai Egozcue

In 2011, the European Network and Information Security Agency (ENISA) conducted a study in the domain of Industrial Control Systems (ICS). Its objective was to obtain the current view on the ICS protection primarily in Europe but also in the international context. The ‘portrait’ included threats, risks, and challenges in the area of ICS protection as well as national, pan European, and international initiatives on ICS security. The study was performed through desktop research, survey and interviews, and a meeting with all involved stakeholders. This chapter highlights the most relevant parts of the final report of the study. It focuses on the challenges to securing ICS identified during the research, but also presents the context and the methodology of the study. In response to the challenges, the seven recommendations of ENISA for protecting ICS are proposed.


2013 ◽  
Vol 336-338 ◽  
pp. 1640-1644
Author(s):  
Zhi Gang Zhang ◽  
Zhuo Lv ◽  
Shuang Xia Niu

This paper analyzes the information security risks faced by the industrial control systems, Propose the Information Security Evaluation on industrial control system based on the level protection assessment technology, The development of industrial control system from the device level , field-level and system-level three levels of information security evaluation, propose the next step in the research program.


Author(s):  
Qingguang Tao ◽  
Min Jiang ◽  
Xiaofeng Wang ◽  
Bo Deng

Today, a large number of information and communication technologies (ICT) and networking technologies are being used in industrial control systems. Thus, networked industrial control systems (NICS) are exposed to many security threats. Moreover, new technologies for NICS also need to be tested. This paper presents a cloud-based experimental platform for NICS to test new technologies and security threats. A cloud platform is used to emulate network devices and Simulink is used to simulate the physical layer. To build this testbed, we modify the cloud platform and add three modules to the testbed. One module is used so that the cloud platform can connect to real devices. By using this module, real devices can be added to the networks in the cloud platform. The second module is used for network connection configurations in the testbed. By using this module, the bandwidth, delay and packet loss rate for networks in the testbed can all be set. The third module is used to connect the Simulink to the testbed. The main features of the proposed platform are high flexibility, high authenticity, and low cost. Advanced persistent threat (APT) attacks are a common threat for NICS nowadays. In order to prove the feasibility of the proposed testbed, a common NICS is established and an APT attack is executed on it.


Author(s):  
Erhovwosere Donald Emake ◽  
Ibrahim Adepoju Adeyanju ◽  
Godwin Obruozie Uzedhe

Cyber-security of digital industrial control system in reality is complex and challenging research area, due to various interconnections of electro-mechanical related components driving national critical infrastructures. These networked system components performs monitoring and controlling tasks in several industries and organization through the access of Internet connectivity across the world. More recently, there are myriad of security threats and attacks by malicious elements on ICS which now presents a priority to organizations and researchers for optimal security solutions. Development of the Internet and communication systems has also exacerbated such security concerns. Activities of cyber-attacks malicious elements on ICS may result in serious disaster in industrial environments, human casualties and loss. This paper critically looks at the SCADA/industrial control systems, architecture, cyber-attacks. Other aspect of the paper examines current ICS security technologies including a computational secured algorithm for PLC


2017 ◽  
Author(s):  
Anil Lamba ◽  
Satinderjeet Singh ◽  
Balvinder Singh ◽  
Natasha Dutta ◽  
Sivakumar Sai Rela Muni

2018 ◽  
Vol 173 ◽  
pp. 01012
Author(s):  
Xiaojun Zhou ◽  
Zhen Xu ◽  
Liming Wang ◽  
Kai Chen ◽  
Cong Chen ◽  
...  

The increasing use of common computer technologies in SCADA systems has brought convenience and at the same time introduced unprecedented security threats. SCADA system is becoming an attacker's target day by day. As attackers gain more understanding of industrial control systems, attacker's attack methods are more and more sophisticated, and the attack intensity is also increasing day by day. Faced with many security threats and risks, traditional security precautions cannot be effectively implemented. Therefore, this paper proposes an improved SCADA defense system, and evaluates it by using a variety of attacks. Experiments show that the defense-in-depth model we proposed is very effective against a variety of attacks.


Sign in / Sign up

Export Citation Format

Share Document