ICS Software Protection

ICS Software Protection

Peter H. Jenney
ISBN13: 9781466626591|ISBN10: 1466626593|EISBN13: 9781466626904
DOI: 10.4018/978-1-4666-2659-1.ch009
Cite Chapter Cite Chapter

MLA

Jenney, Peter H. "ICS Software Protection." Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection, edited by Christopher Laing, et al., IGI Global, 2013, pp. 217-239. https://doi.org/10.4018/978-1-4666-2659-1.ch009

APA

Jenney, P. H. (2013). ICS Software Protection. In C. Laing, A. Badii, & P. Vickers (Eds.), Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection (pp. 217-239). IGI Global. https://doi.org/10.4018/978-1-4666-2659-1.ch009

Chicago

Jenney, Peter H. "ICS Software Protection." In Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection, edited by Christopher Laing, Atta Badii, and Paul Vickers, 217-239. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-2659-1.ch009

Export Reference

Mendeley
Favorite

Abstract

Industrial Control System (ICS) cyber security is weak and exploitable. As evidenced by STUXNET’s attack on the Iranian Natanz1 nuclear facility in 2010 and others since global critical infrastructure is in danger of cyber attack. The problem stems from the growth of industrial management systems over three distinct generations that moved process management systems from manual to fully networked controls and sensors. In many cases the transition has been poorly managed and proper IT management techniques were not employed. In others, the software and hardware systems are so fragile that any change or unexpected access can crash or otherwise render them useless. These instabilities, both caused by poor management and weak equipment open large security holes that allow hackers to exploit critical systems with potentially disastrous results. For example, a petroleum distillery could be made to vent and burn excess gas at a time where it could potentially destroy the facility or perhaps take down entire electrical grids, inconveniencing and possibly causing significant harm.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.