Reference Hub3
Cyber-Security for ICS/SCADA: A South African Perspective

Cyber-Security for ICS/SCADA: A South African Perspective

Barend Pretorius, Brett van Niekerk
ISBN13: 9781799824664|ISBN10: 1799824667|EISBN13: 9781799824671
DOI: 10.4018/978-1-7998-2466-4.ch038
Cite Chapter Cite Chapter

MLA

Pretorius, Barend, and Brett van Niekerk. "Cyber-Security for ICS/SCADA: A South African Perspective." Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2020, pp. 613-630. https://doi.org/10.4018/978-1-7998-2466-4.ch038

APA

Pretorius, B. & van Niekerk, B. (2020). Cyber-Security for ICS/SCADA: A South African Perspective. In I. Management Association (Ed.), Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications (pp. 613-630). IGI Global. https://doi.org/10.4018/978-1-7998-2466-4.ch038

Chicago

Pretorius, Barend, and Brett van Niekerk. "Cyber-Security for ICS/SCADA: A South African Perspective." In Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 613-630. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-7998-2466-4.ch038

Export Reference

Mendeley
Favorite

Abstract

Industrial control systems (ICS) or supervisory, control, and data acquisition (SCADA) systems drive many key components of the national infrastructure. It makes these control systems targets for cyber-attacks by terrorists and nation-states who wish to damage their target economically and socially, and cyber-criminals who blackmail the companies operating the infrastructure. Despite the high risk of leaving these systems exposed, providing adequate cyber-security is often challenging. The Stuxnet worm illustrated how vulnerable control systems potentially are when it bypassed a number of security mechanisms to cause physical damage to an Iranian nuclear facility. The article focuses on ICS/SCADA in South Africa discussing the unique challenges and legislation relate to securing control system in the South Africa. A governance and security framework for overcoming these challenges are proposed.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.