2018
DOI: 10.31142/ijtsrd9556
|View full text |Cite
|
Sign up to set email alerts
|

SCADA for National Critical Infrastructures: Review of the Security Threats, Vulnerabilities and Countermeasures

Abstract: The Supervisory Control And Data Acquisition (SCADA) networks contain computers and applications that perform key functions in providing essential services and commodities to citizens such as electricity, natural gas, crude oil and refined petroleum products, waste-water treatment and transportation. This paper looks at SCAD architecture and functions to industrial control system (ICS) as well its security threats, vulnerabilities and attacks that could prevent SCADA from delivering these functions especially … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…Strengthening cybersecurity measures is imperative as Nigeria moves towards a cashless economy because it's a critical defence against fraud in digital payment systems and cyber threats [6], and [43]. Resilient cybersecurity measures aid in defending against cyber threats and fraud, thereby guaranteeing the security and integrity of digital payment transactions, as claimed by [39] and [15].…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Strengthening cybersecurity measures is imperative as Nigeria moves towards a cashless economy because it's a critical defence against fraud in digital payment systems and cyber threats [6], and [43]. Resilient cybersecurity measures aid in defending against cyber threats and fraud, thereby guaranteeing the security and integrity of digital payment transactions, as claimed by [39] and [15].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Furthermore, poor organizational systems, security risks, and hazards make the shift from a cash-dominated economic environment to a cashless economy even more difficult as technology becomes more ubiquitous with interconnected and interdependent facilities. The reliance on digital transactions exposes individuals, businesses, and financial systems to cyberattacks, fraud, and data breaches, which remains a major anxiety [43]. Adopting a cashless economy will require ensuring the strength of security measures and fostering public confidence in digital payment systems.…”
Section: Introductionmentioning
confidence: 99%
“…These electromechanical complex systems respond to real-time data acquisition, system monitoring and automatic control and management of industrial processes [2]. Today, many nations and organizations' critical infrastructures rely on and are driven by ICS controllers to render control functions [3]. Currently, modern society controlled ICS processes include petroleum and gas refining [4], pipelines and distribution [5], electrical energy generation, transmission and distribution [6], water treatment and distribution [7] [8], chemical processing, pharmaceutical, food and beverage production, railway transportation and air traffic control [9].…”
Section: Introductionmentioning
confidence: 99%
“…Presently there is a very high rate of vulnerability and cyber-attacks globally on ICS, some of these threats and attacking agents include terrorist network groups, dissatisfied employees, hostile governments and other malicious intruders [14]. Cyberattacks consequences are very devastating with effects ranging from disruption or damage to critical infrastructural operations [15,3] to significant effect on public health, safety, and destruction of lives and properties [14]. An in-depth understanding of the vulnerabilities, threats, and attacks are crucial to the defense mechanisms and security methodologies of any ICS environment.…”
Section: Introductionmentioning
confidence: 99%
“…As the industrial infrastructures converge with the digital world and expand their capabilities to meet the ever-increasing stakeholders' pressures, their protection mechanisms need to be in tune with its new architecture. (Obodoeze et al, 2018). The challenge is that with the introduction of automated control and management, ICS security inherits the vulnerability challenges of remotely accessible systems.…”
mentioning
confidence: 99%