{"title":"监控和数据采集(SCADA)系统的网络安全问题","authors":"D. Dumont","doi":"10.1109/THS.2010.5654964","DOIUrl":null,"url":null,"abstract":"IEEE HST 2010 Conference Monitoring the distribution of our nation's critical infrastructure services is very complicated. Transportation, chemical, water, natural gas, petroleum, electricity, and energy sectors rely heavily on the ability of Supervisory Control and Data Acquisition (SCADA) systems to monitor and respond to changes and fluctuations within the system (NIPP, 2009). Changes can be reflected by natural elements such as the weather or based on customer demand. SCADA refers to the computer controlled and interfaced systems that run an industry's operations. SCADA systems at one time were not connected to the outside world and industrial operations were computer controlled within the property boundary that defined the facility. However, with maturity, technology and increased competition comes the advent of monitoring of customer usage. This also increases risk of cyber threat. In this paper, we will discuss SCADA usage and cyber vulnerability.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"Cyber security concerns of Supervisory Control and Data Acquisition (SCADA) systems\",\"authors\":\"D. Dumont\",\"doi\":\"10.1109/THS.2010.5654964\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"IEEE HST 2010 Conference Monitoring the distribution of our nation's critical infrastructure services is very complicated. Transportation, chemical, water, natural gas, petroleum, electricity, and energy sectors rely heavily on the ability of Supervisory Control and Data Acquisition (SCADA) systems to monitor and respond to changes and fluctuations within the system (NIPP, 2009). Changes can be reflected by natural elements such as the weather or based on customer demand. SCADA refers to the computer controlled and interfaced systems that run an industry's operations. SCADA systems at one time were not connected to the outside world and industrial operations were computer controlled within the property boundary that defined the facility. However, with maturity, technology and increased competition comes the advent of monitoring of customer usage. This also increases risk of cyber threat. In this paper, we will discuss SCADA usage and cyber vulnerability.\",\"PeriodicalId\":106557,\"journal\":{\"name\":\"2010 IEEE International Conference on Technologies for Homeland Security (HST)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-12-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 IEEE International Conference on Technologies for Homeland Security (HST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/THS.2010.5654964\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/THS.2010.5654964","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cyber security concerns of Supervisory Control and Data Acquisition (SCADA) systems
IEEE HST 2010 Conference Monitoring the distribution of our nation's critical infrastructure services is very complicated. Transportation, chemical, water, natural gas, petroleum, electricity, and energy sectors rely heavily on the ability of Supervisory Control and Data Acquisition (SCADA) systems to monitor and respond to changes and fluctuations within the system (NIPP, 2009). Changes can be reflected by natural elements such as the weather or based on customer demand. SCADA refers to the computer controlled and interfaced systems that run an industry's operations. SCADA systems at one time were not connected to the outside world and industrial operations were computer controlled within the property boundary that defined the facility. However, with maturity, technology and increased competition comes the advent of monitoring of customer usage. This also increases risk of cyber threat. In this paper, we will discuss SCADA usage and cyber vulnerability.