Reference Hub1
SCADA Systems Cyber Security for Critical Infrastructures: Case Studies in Multiple Sectors

SCADA Systems Cyber Security for Critical Infrastructures: Case Studies in Multiple Sectors

Suhaila Ismail, Elena Sitnikova, Jill Slay
ISBN13: 9781799824664|ISBN10: 1799824667|EISBN13: 9781799824671
DOI: 10.4018/978-1-7998-2466-4.ch028
Cite Chapter Cite Chapter

MLA

Ismail, Suhaila, et al. "SCADA Systems Cyber Security for Critical Infrastructures: Case Studies in Multiple Sectors." Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2020, pp. 446-464. https://doi.org/10.4018/978-1-7998-2466-4.ch028

APA

Ismail, S., Sitnikova, E., & Slay, J. (2020). SCADA Systems Cyber Security for Critical Infrastructures: Case Studies in Multiple Sectors. In I. Management Association (Ed.), Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications (pp. 446-464). IGI Global. https://doi.org/10.4018/978-1-7998-2466-4.ch028

Chicago

Ismail, Suhaila, Elena Sitnikova, and Jill Slay. "SCADA Systems Cyber Security for Critical Infrastructures: Case Studies in Multiple Sectors." In Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 446-464. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-7998-2466-4.ch028

Export Reference

Mendeley
Favorite

Abstract

Past cyber-attacks on Supervisory Control and Data Acquisition (SCADA) Systems for Critical infrastructures have left these systems compromised and caused financial and economic problems. Deliberate attacks have resulted in denial of services and physical injury to the public in certain cases. This study explores the past attacks on SCADA Systems by examining nine case studies across multiple utility sectors including transport, energy and water and sewage sector. These case studies will be further analysed according to the cyber-terrorist decision-making theories including strategic, organisational and psychological theories based on McCormick (2000). Next, this study will look into cyber-terrorist capabilities in conducting attacks according to Nelson's (1999) approach that includes simple-unstructured, advance-structured and complex-coordinated capabilities. The results of this study will form the basis of a guideline that organisations can use so that they are better prepared in identifying potential future cybersecurity attacks on their SCADA systems.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.