{"title":"下一代SCADA安全:最佳实践和客户端难题","authors":"Calvert L. Bowen, T. Buennemeyer, Ryan W. Thomas","doi":"10.1109/IAW.2005.1495984","DOIUrl":null,"url":null,"abstract":"Supervisory control and data acquisition (SCADA) systems are found throughout the public utility industry. As part of our national critical infrastructure, SCADA systems are used to monitor, control and manage spatially separated utility sites. SCADA systems are mirroring the rapid changes occurring in the larger information technology (IT) and networking industry by becoming more flexible and at the same time more interconnected. These primitive systems are being upgraded using commercial-off-the-shelf (COTS) hardware and software, and are being migrated to standard data formats and network protocols, particularly transport control protocol (TCP) for end-to-end control. Throughout this transition, SCADA system networks must be well defended and maintain the level of service required by their customers.","PeriodicalId":252208,"journal":{"name":"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"40","resultStr":"{\"title\":\"Next generation SCADA security: best practices and client puzzles\",\"authors\":\"Calvert L. Bowen, T. Buennemeyer, Ryan W. Thomas\",\"doi\":\"10.1109/IAW.2005.1495984\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Supervisory control and data acquisition (SCADA) systems are found throughout the public utility industry. As part of our national critical infrastructure, SCADA systems are used to monitor, control and manage spatially separated utility sites. SCADA systems are mirroring the rapid changes occurring in the larger information technology (IT) and networking industry by becoming more flexible and at the same time more interconnected. These primitive systems are being upgraded using commercial-off-the-shelf (COTS) hardware and software, and are being migrated to standard data formats and network protocols, particularly transport control protocol (TCP) for end-to-end control. Throughout this transition, SCADA system networks must be well defended and maintain the level of service required by their customers.\",\"PeriodicalId\":252208,\"journal\":{\"name\":\"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop\",\"volume\":\"23 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-06-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"40\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IAW.2005.1495984\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IAW.2005.1495984","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Next generation SCADA security: best practices and client puzzles
Supervisory control and data acquisition (SCADA) systems are found throughout the public utility industry. As part of our national critical infrastructure, SCADA systems are used to monitor, control and manage spatially separated utility sites. SCADA systems are mirroring the rapid changes occurring in the larger information technology (IT) and networking industry by becoming more flexible and at the same time more interconnected. These primitive systems are being upgraded using commercial-off-the-shelf (COTS) hardware and software, and are being migrated to standard data formats and network protocols, particularly transport control protocol (TCP) for end-to-end control. Throughout this transition, SCADA system networks must be well defended and maintain the level of service required by their customers.