Cyber-Security for ICS/SCADA: A South African Perspective

Cyber-Security for ICS/SCADA: A South African Perspective

Barend Pretorius (Transnet and University of KwaZulu-Natal, Durban, South Africa) and Brett van Niekerk (Transnet and University of KwaZulu-Natal, Durban, South Africa)
Copyright: © 2016 |Pages: 16
DOI: 10.4018/IJCWT.2016070101
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

Industrial control systems (ICS) or supervisory, control, and data acquisition (SCADA) systems drive many key components of the national infrastructure. It makes these control systems targets for cyber-attacks by terrorists and nation-states who wish to damage their target economically and socially, and cyber-criminals who blackmail the companies operating the infrastructure. Despite the high risk of leaving these systems exposed, providing adequate cyber-security is often challenging. The Stuxnet worm illustrated how vulnerable control systems potentially are when it bypassed a number of security mechanisms to cause physical damage to an Iranian nuclear facility. The article focuses on ICS/SCADA in South Africa discussing the unique challenges and legislation relate to securing control system in the South Africa. A governance and security framework for overcoming these challenges are proposed.
Article Preview

Cyber-Security And Governance Of Ics/Scada Environments

This section will discuss the differences between ICS/SCADA environments and traditional enterprise networks, cyber-security incidents involving industrial control and related systems, the vulnerabilities and threats related to ICS/SCADA, and the international frameworks for these environments.

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing