Developing a Secure Cyber Ecosystem for SCADA Architecture
Title | Developing a Secure Cyber Ecosystem for SCADA Architecture |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Kumar, S., Gaur, N., Kumar, A. |
Conference Name | 2018 Second International Conference on Computing Methodologies and Communication (ICCMC) |
ISBN Number | 978-1-5386-3452-3 |
Keywords | CII, composability, computer security, Conferences, critical information, critical infrastructure, Cyber Attacks, Cyber invasions, cyber resilience, cyber terrorism, Global village, Human Behavior, Industries, Monitoring, network attack, PLC, pubcrawl, Resiliency, Resilient Security Architectures, robust cyber security, RTU, SCADA, SCADA architecture, SCADA network systems, SCADA systems, SCADA Systems Security, secure Cyber ecosystem, security of data, states security system, Terrorism |
Abstract | Advent of Cyber has converted the entire World into a Global village. But, due to vurneabilites in SCADA architecture [1] national assests are more prone to cyber attacks.. Cyber invasions have a catastrophic effect in the minds of the civilian population, in terms of states security system. A robust cyber security is need of the hour to protect the critical information infastructrue & critical infrastructure of a country. Here, in this paper we scrutinize cyber terrorism, vurneabilites in SCADA network systems [1], [2] and concept of cyber resilience to combat cyber attacks. |
URL | https://ieeexplore.ieee.org/document/8487713 |
DOI | 10.1109/ICCMC.2018.8487713 |
Citation Key | kumar_developing_2018 |
- Monitoring
- Terrorism
- states security system
- security of data
- secure Cyber ecosystem
- SCADA Systems Security
- SCADA systems
- SCADA network systems
- SCADA architecture
- SCADA
- RTU
- robust cyber security
- pubcrawl
- PLC
- network attack
- Resilient Security Architectures
- Industries
- Human behavior
- Global village
- cyber terrorism
- cyber resilience
- Cyber invasions
- Cyber Attacks
- critical infrastructure
- critical information
- Conferences
- computer security
- composability
- CII
- Resiliency