SCADA system security: Challenges and recommendations

Author(s):  
Suhas Rautmare
2011 ◽  
pp. 1724-1732
Author(s):  
Pravin Shetty ◽  
Seng Loke

The Internet has proven to be the most convenient and demanding facility for various types of businesses and transactions for the past few years. In recent years, business information systems have expanded into networks, encompassing partners, suppliers, and customers. There has been a global availability (Anderson, 2001; BSI Global, 2003) of resources over the Internet to satisfy different needs in various fields. The availability factor has called for various security challenges in fields where information is very valuable and not meant for all. Potential threats to information and system security come from a variety of sources. These threats may result in violations to confidentiality, interruptions in information integrity, and possible disruption in the delivery of services. So it is essential to manage the flow of information over the network with the required level of security. There are many security technologies and models that have been introduced which are capable of realizing the functions and objectives of information system security. This article first gives a brief overview of what we term basic security policies of an integrated security model. Then it suggests context-based security policies for a health organization scenario using contextual graphs augmented with details about specific security actions, which relate to the security policies enumerated in the integrated security model. The plan of the article is as follows. We first overview the three concepts in detail and briefly describe the concept of contextual (meta-policy) graphs. We then develop a context-based security meta-policy for securing patient records based on the security policies overviewed and discuss related work, before concluding the paper.


Author(s):  
Albérico Travassos Rosário ◽  
Ricardo Raimundo

Diverse forms of artificial intelligence (AI in further text) are at the forefront of triggering digital security innovations, based on the threats that are arising in this post COVID world. On the one hand, companies are experiencing difficulty in dealing with security challenges with regard to a variety of issues ranging from system openness, decision making, quality control and web domain, just to mention a few. On the other hand, in the last decade, research has focused on security capabilities based on tools such as platform complacency, intelligent trees, modeling methods and outage management systems, in an effort to understanding the interplay between AI and those issues. The dependence on the emergence of AI in running industries and shaping the education, transports and health sectors is now well known in literature. AI is increasingly employed in managing data security across economic sectors. Thus, a literature review of AI and system secu-rity within the current digital society is opportune. This paper aims at identifying research trends in the field through a Systematic Bibliometric Literature Review (LRSB) of research on AI and system security. The review entails 77 articles published in Scopus® database, presenting up-to-date knowledge on the topic. The LRSB results were synthesized across current research subthemes. Findings are presented. The originality of the paper relies on its LRSB method, together with extant review of articles that have not been categorized so far. Implications for future re-search are suggested.


Author(s):  
Saqib Ali ◽  
Taiseera Al Balushi ◽  
Zia Nadir ◽  
Omar Khadeer Hussain
Keyword(s):  

Author(s):  
Moustapha Fall ◽  
Chris Chuvalas ◽  
Nolan Warning ◽  
Max Rabiee ◽  
Carla Purdy
Keyword(s):  

2017 ◽  
Vol 14 (3) ◽  
pp. 235-236 ◽  
Author(s):  
Kim-Kwang Raymond Choo ◽  
Mehran Mozaffari Kermani ◽  
Reza Azarderakhsh ◽  
Manimaran Govindarasu

Author(s):  
Pravin Shetty ◽  
Seng Loke

The Internet has proven to be the most convenient and demanding facility for various types of businesses and transactions for the past few years. In recent years, business information systems have expanded into networks, encompassing partners, suppliers, and customers. There has been a global availability (Anderson, 2001; BSI Global, 2003) of resources over the Internet to satisfy different needs in various fields. The availability factor has called for various security challenges in fields where information is very valuable and not meant for all. Potential threats to information and system security come from a variety of sources. These threats may result in violations to confidentiality, interruptions in information integrity, and possible disruption in the delivery of services. So it is essential to manage the flow of information over the network with the required level of security.


2016 ◽  
Vol 4 (2-4) ◽  
pp. 199-207
Author(s):  
Shweta Malhotra ◽  
Mohammad Najmud Doja ◽  
Bashir Alam ◽  
Mansaf Alam

Sign in / Sign up

Export Citation Format

Share Document