Abstract
There is continuing interest in researching generic security architectures and strategies for managing SCADA and process control systems. Documentation from various countries on IT security does now begin to recommendations for security controls for (federal) information systems which include connected process control systems. Little or no work exists in the public domain which takes a big picture approach to the issue of developing a generic or generalisable approach to SCADA and process control system forensics. The discussion raised in this paper is that before one can develop solutions to the problem of SCADA forensics, a good understanding of the forensic computing process, and the range of technical and procedural issues subsumed with in this process, need to be understood, and also agreed, by governments, industry and academia.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-3-642-02312-5_25
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Chandia, R., Gonzalez, J., Kilpatrick, T., Papa, M., Shenoi, S.: IFIP International Federation for Information Processing. In: Goetz, E., Shenoi, S. (eds.) Critical Infrastructure Protection, vol. 253, pp. 117–131. Springer, Boston (2008)
Cassidy, R.F., Chavez, A., Trent, J., Urrea, J.: IFIP International Federation for Information Processing. In: Goetz, E., Shenoi, S. (eds.) Critical Infrastructure Protection, vol. 253, pp. 223–235. Springer, Boston (2008)
Slay, J., Miller, M.: A Security Architecture for SCADA Networks. In: Proceedings of the17th Australasian Conference on Information Systems, Adelaide, December 5-6 (2006)
Slay, J., Miller, M.: The Maroochy Water SCADA Breach: Implications of Lessons Learned for Research. In: Advances in Critical Infrastructure Protection, pp. 73–82. Springer, Boston (2008)
Beckett, J.J., Slay, J.: Digital Forensics: Validation and Verification in a Dynamic Work Environment. In: HICSS-40, Hawaii, January 3 (2007)
Miller, A.: Trends in Process Control Systems Security. In: IEEE Security and Privacy, pp. 57–60 (September/October 2005)
McKemmish, R.: What is Forensic Computing, Australian Institute of Criminology (1999)
Corporate & Technology Group of Freehills 2001, Cybercrime Act 2001 (Cth), FindLaw.com, viewed 27/03 (2006), http://www.findlaw.com.au/article/1408.htm
Fabro, M.: Recommended Practice: Creating Cyber Forensics Plans for Control Systems, Department of Homeland Security (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Slay, J., Sitnikova, E. (2009). The Development of a Generic Framework for the Forensic Analysis of SCADA and Process Control Systems. In: Sorell, M. (eds) Forensics in Telecommunications, Information and Multimedia. e-Forensics 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 8. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02312-5_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-02312-5_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-02311-8
Online ISBN: 978-3-642-02312-5
eBook Packages: Computer ScienceComputer Science (R0)