2019
DOI: 10.1016/j.ijcip.2019.01.002
|View full text |Cite
|
Sign up to set email alerts
|

Extending the cyber-attack landscape for SCADA-based critical infrastructure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(17 citation statements)
references
References 32 publications
0
15
0
1
Order By: Relevance
“…A similar classification is presented in [58]. The authors proposed a cyber-attack framework to extend the attack landscape for critical infrastructure, consisting of four attack classes, namely traditional IT-based attacks, protocol-specific attacks, configuration-based attacks, and process control attacks.…”
Section: Attack Types In Scada Systemsmentioning
confidence: 99%
“…A similar classification is presented in [58]. The authors proposed a cyber-attack framework to extend the attack landscape for critical infrastructure, consisting of four attack classes, namely traditional IT-based attacks, protocol-specific attacks, configuration-based attacks, and process control attacks.…”
Section: Attack Types In Scada Systemsmentioning
confidence: 99%
“…Rodofile et al 11 collected existing known attacks combined with the existing range of attack landscapes, expanded, and “filled the gaps” in the landscape. They presented a complete cyber‐attack system that perceives attacks against the entire SCADA‐based critical infrastructure.…”
Section: Related Workmentioning
confidence: 99%
“…IS governance in the utilities industry is a relatively new subject, since this market is increasingly heating. Due to the growing attacks to this environment the theme was given more importance, in order to ensure availability, confidentiality and integrity of information in the electricity industry (Amin and Wollenberg, 2005;Evans et al, 2019;Machado et al, 2016;Kim and Tong, 2013;Rodofile et al, 2019;Thiyagarajan et al, 2015;Woo and Kim, 2018).…”
Section: Information Security Governance In the Electricity Industrymentioning
confidence: 99%
“…On 05/07/2021 the Colonial Pipeline System (Texas, USA), the company that operates the largest fuel transfer pipeline on the east coast of the USA, suffered an attack forcing the company to deactivate its operation (Sanger et al, 2021). Another example is a malware that, on 01/25/2003, deactivated the security system from a nuclear company in the United States, Ohio, making impossible the control of temperature measurement sensors' indicators (Rodofile et al, 2019).…”
Section: Introductionmentioning
confidence: 99%