Safeguarding Australia from Cyber-Terrorism: A SCADA Risk Framework

Safeguarding Australia from Cyber-Terrorism: A SCADA Risk Framework

Christopher Beggs (Security Infrastructure Solutions, Australia) and Matthew Warren (Deakin University, Australia)
DOI: 10.4018/978-1-4666-0197-0.ch021
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

Terrorist groups are currently using information and communication technologies (ICTs) to orchestrate their conventional attacks. More recently, terrorists have been developing a new form of capability within the cyber-arena to coordinate cyber-based attacks. This chapter identifies that cyber-terrorism capabilities are an integral, imperative, yet under-researched component in establishing, and enhancing cyber-terrorism risk assessment models for SCADA systems. This chapter examines a cyber-terrorism SCADA risk framework that has been adopted and validated by SCADA industry practitioners. The chapter proposes a high level managerial framework, which is designed to measure and protect SCADA systems from the threat of cyber-terrorism within Australia. The findings and results of an industry focus group are presented in support of the developed framework for SCADA industry acceptance.
Chapter Preview
Top

Cyber-Terrorism Scada Risk Assessment

This cyber-terrorism SCADA risk assessment subset represents the first stage processes in measuring and protecting SCADA systems from the threat of cyber-terrorism within Australia. The subset discusses the various steps that should be used to conduct a risk assessment on a SCADA system. These steps have been adopted and aligned with the procedures documented in the AS/NZS ISO 31000:2009 risk management standard. Some of the procedures and steps for conducting a risk assessment have been customised to fit a generic SCADA risk assessment and some stages within the process have been modified to suit the SCADA environment. This stage only provides a baseline security risk assessment process that is applicable for SCADA systems. Organisations can use this subset and modify it to suit their SCADA configuration and their organisation requirements and needs.

Complete Chapter List

Search this Book:
Reset