z-logo
Premium
Beware of SCADA System Vulnerability
Author(s) -
Brilliant Mark,
Mains Ken
Publication year - 2010
Publication title -
opflow
Language(s) - English
Resource type - Journals
eISSN - 1551-8701
pISSN - 0149-8029
DOI - 10.1002/j.1551-8701.2010.tb03015.x
Subject(s) - scada , hacker , exploit , computer security , the internet , vulnerability (computing) , computer science , hazardous waste , engineering , world wide web , electrical engineering , waste management
This article begins by providing a brief overview of how automated hacking programs exploit computer systems. The article lists the characteristics of an ideal host computer that allow a hacking program to imbed a small remote access and control application, turning the infected computer system into a “zombie” that remains dormant while awaiting instructions from its master. A water or wastewater supervisory control and data acquisition (SCADA) system usually satisfies these ideal conditions. The most vulnerable are small and medium‐size SCADA systems that are connected to the Internet for data transfer and control needs. The article provides guidelines for protecting SCADA systems from hackers, and recommends avoiding Internet connectivity if at all possible, along with developing a Workplace Hazardous Materials Information System for the Internet that defines proper rules and regulations.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here