Scada Security?
Author(s) -
Jean Thilmany
Publication year - 2012
Publication title -
mechanical engineering
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.117
H-Index - 17
eISSN - 1943-5649
pISSN - 0025-6501
DOI - 10.1115/1.2012-jun-1
Subject(s) - scada , computer security , control system security , hacker , publicity , government (linguistics) , national security , engineering , legislation , critical infrastructure , oil refinery , computer science , business , information security , software security assurance , security service , law , political science , electrical engineering , linguistics , philosophy , marketing , waste management
This article focuses on the introduction of advance security checks to counter negative publicity of supervisory control and data acquisition (SCADA) systems. The SCADA security concerns have come to be seen as a big deal because the systems can be found within power plants, refineries, pipelines, water treatment plants, and the telecommunications industry, where hackers could do great damage that would affect the public. In light of SCADA security concerns, security researchers have stepped up efforts to find and to call attention to the systems’ vulnerabilities. As national attention has only recently turned to SCADA security, system users have few regulatory specifications by which they must abide. In 2006, the federal government charged the North American Electric Reliability Corp., or NERC, with defining and implementing standards for critical infrastructure protection within the industry. A number of pieces of legislation have been passed and proposed to address software security. The big one right now is the Cybersecurity Act of 2012, which has been introduced by Senator Joseph Lieberman of Connecticut.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom