Reference Hub6
Control Systems Security

Control Systems Security

Jake Brodsky, Robert Radvanovsky
ISBN13: 9781616928056|ISBN10: 1616928050|EISBN13: 9781616928070
DOI: 10.4018/978-1-61692-805-6.ch010
Cite Chapter Cite Chapter

MLA

Brodsky, Jake, and Robert Radvanovsky. "Control Systems Security." Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications, edited by Thomas J. Holt and Bernadette H. Schell, IGI Global, 2011, pp. 187-204. https://doi.org/10.4018/978-1-61692-805-6.ch010

APA

Brodsky, J. & Radvanovsky, R. (2011). Control Systems Security. In T. Holt & B. Schell (Eds.), Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications (pp. 187-204). IGI Global. https://doi.org/10.4018/978-1-61692-805-6.ch010

Chicago

Brodsky, Jake, and Robert Radvanovsky. "Control Systems Security." In Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications, edited by Thomas J. Holt and Bernadette H. Schell, 187-204. Hershey, PA: IGI Global, 2011. https://doi.org/10.4018/978-1-61692-805-6.ch010

Export Reference

Mendeley
Favorite

Abstract

With recent news media discussions highlighting the safety and integrity of the U.S. national power grid, questions have been raised by both political and executive-level management, specifically, as to the risks associated with our critical infrastructures. More specifically, the issue of concern is dealing with and addressing cyber vulnerability issues, threats and risks associated with an extremely complex and inter-twining series of dependencies arising from legacy industries established almost 100 years ago. Equally as important are the growing threats and risks to these environments resulting from their exposure to outside networks (such as the Internet), exposing critically vital and important cyber systems to just about everyone and anyone globally. This chapter highlights the importance of preventing hack attacks against SCADA systems, or Industrial Control Systems (abbreviated as ICS), as a means of protecting our critical infrastructures.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.