2024
DOI: 10.1145/3630103
|View full text |Cite
|
Sign up to set email alerts
|

Techniques for Enhancing Security in Industrial Control Systems

Vijay Varadharajan,
Uday Tupakula,
Kallol Krishna Karmakar

Abstract: Increasingly Industrial Control Systems (ICS) systems are being connected to the Internet to minimise the operational costs and provide additional flexibility. These control systems such as the ones used in power grids, manufacturing and utilities operate continually and have long lifespans measured in decades rather than years as in the case of IT systems. Such industrial control systems require uninterrupted and safe operation. However, they can be vulnerable to a variety of attacks, as successful attacks on… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 43 publications
0
0
0
Order By: Relevance
“…Weak passwords, often resulting from a lack of password complexity requirements or infrequent password updates, make it easier for attackers to gain unauthorized access to sensitive systems. Similarly, lax access controls may grant unnecessary permissions to users, increasing the likelihood of unauthorized individuals exploiting these privileges to compromise confidential data, manipulate transactions, or disrupt business operations [170]- [172]. Inadequate firewall configurations may leave entry points open for cyber threats, allowing malicious actors to exploit vulnerabilities and compromise the security of e-commerce platforms.…”
Section: Poorly Configured Security Settingsmentioning
confidence: 99%
“…Weak passwords, often resulting from a lack of password complexity requirements or infrequent password updates, make it easier for attackers to gain unauthorized access to sensitive systems. Similarly, lax access controls may grant unnecessary permissions to users, increasing the likelihood of unauthorized individuals exploiting these privileges to compromise confidential data, manipulate transactions, or disrupt business operations [170]- [172]. Inadequate firewall configurations may leave entry points open for cyber threats, allowing malicious actors to exploit vulnerabilities and compromise the security of e-commerce platforms.…”
Section: Poorly Configured Security Settingsmentioning
confidence: 99%