Cyber Security in Liquid Petroleum Pipelines

Cyber Security in Liquid Petroleum Pipelines

Morgan Henrie
ISBN13: 9781609608514|ISBN10: 1609608518|EISBN13: 9781609608521
DOI: 10.4018/978-1-60960-851-4.ch011
Cite Chapter Cite Chapter

MLA

Henrie, Morgan. "Cyber Security in Liquid Petroleum Pipelines." Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies, edited by Junaid Ahmed Zubairi and Athar Mahboob, IGI Global, 2012, pp. 200-222. https://doi.org/10.4018/978-1-60960-851-4.ch011

APA

Henrie, M. (2012). Cyber Security in Liquid Petroleum Pipelines. In J. Zubairi & A. Mahboob (Eds.), Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies (pp. 200-222). IGI Global. https://doi.org/10.4018/978-1-60960-851-4.ch011

Chicago

Henrie, Morgan. "Cyber Security in Liquid Petroleum Pipelines." In Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies, edited by Junaid Ahmed Zubairi and Athar Mahboob, 200-222. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-60960-851-4.ch011

Export Reference

Mendeley
Favorite

Abstract

The world’s critical infrastructure includes entities such as the water, waste water, electrical utilities, and the oil and gas industry. In many cases, these rely on pipelines that are controlled by supervisory control and data acquisition (SCADA) systems. SCADA systems have evolved to highly networked, common platform systems. This evolutionary process creates expanding and changing cyber security risks. The need to address this risk profile is mandated from the highest government level. This chapter discusses the various processes, standards, and industry based best practices that are directed towards minimizing these risks.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.