Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research 2011
DOI: 10.1145/2179298.2179361
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting the critical infrastructure via nontraditional system inputs

Abstract: Critical infrastructures such as oil and gas pipelines, the electric power grid, and railways, rely on the proper operation of supervisory control and data acquisition (SCADA) systems. The trend to interconnect SCADA system devices using networking technologies, however, has introduced additional entry points for malicious software, often via the Internet. In an attempt to manage the new risks, security personnel are incorporating network isolation and standard information technology practices (e.g., firewalls… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 8 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?