Reference Hub1
Challenges in Securing Industrial Control Systems Using Future Internet Technologies

Challenges in Securing Industrial Control Systems Using Future Internet Technologies

Mirjana D. Stojanović, Slavica V. Boštjančič Rakas
Copyright: © 2022 |Pages: 26
ISBN13: 9781668436981|ISBN10: 1668436981|EISBN13: 9781668436998
DOI: 10.4018/978-1-6684-3698-1.ch026
Cite Chapter Cite Chapter

MLA

Stojanović, Mirjana D., and Slavica V. Boštjančič Rakas. "Challenges in Securing Industrial Control Systems Using Future Internet Technologies." Research Anthology on Business Aspects of Cybersecurity, edited by Information Resources Management Association, IGI Global, 2022, pp. 561-586. https://doi.org/10.4018/978-1-6684-3698-1.ch026

APA

Stojanović, M. D. & Boštjančič Rakas, S. V. (2022). Challenges in Securing Industrial Control Systems Using Future Internet Technologies. In I. Management Association (Ed.), Research Anthology on Business Aspects of Cybersecurity (pp. 561-586). IGI Global. https://doi.org/10.4018/978-1-6684-3698-1.ch026

Chicago

Stojanović, Mirjana D., and Slavica V. Boštjančič Rakas. "Challenges in Securing Industrial Control Systems Using Future Internet Technologies." In Research Anthology on Business Aspects of Cybersecurity, edited by Information Resources Management Association, 561-586. Hershey, PA: IGI Global, 2022. https://doi.org/10.4018/978-1-6684-3698-1.ch026

Export Reference

Mendeley
Favorite

Abstract

This chapter explores challenges in securing industrial control systems (ICS) and Supervisory Control And Data Acquisition (SCADA) systems using Future Internet technologies. These technologies include cloud computing, fog computing, Industrial internet of things (IIoT), etc. The need to design specific security solutions for ICS/SCADA networks is explained. A brief overview of cyber vulnerabilities and threats in industrial control networks, cloud, and IoT environments is presented. The security of cloud-based SCADA systems is considered, including benefits and risks of SCADA migration to the cloud, challenges in securing such systems, and migration toward fog computing. Challenges in securing IIoT are addressed, including security risks and operational issues, key principles for securing IIoT, the functional security architecture, and the role of fog computing. Authors point out current standardization activities and trends in the area, and emphasize conclusions and future research directions.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.