Reference Hub1
SCADA Systems Cyber Security for Critical Infrastructures: Case Studies in Multiple Sectors

SCADA Systems Cyber Security for Critical Infrastructures: Case Studies in Multiple Sectors

Suhaila Ismail, Elena Sitnikova, Jill Slay
Copyright: © 2016 |Volume: 6 |Issue: 3 |Pages: 17
ISSN: 1947-3435|EISSN: 1947-3443|EISBN13: 9781466692206|DOI: 10.4018/IJCWT.2016070107
Cite Article Cite Article

MLA

Ismail, Suhaila, et al. "SCADA Systems Cyber Security for Critical Infrastructures: Case Studies in Multiple Sectors." IJCWT vol.6, no.3 2016: pp.79-95. http://doi.org/10.4018/IJCWT.2016070107

APA

Ismail, S., Sitnikova, E., & Slay, J. (2016). SCADA Systems Cyber Security for Critical Infrastructures: Case Studies in Multiple Sectors. International Journal of Cyber Warfare and Terrorism (IJCWT), 6(3), 79-95. http://doi.org/10.4018/IJCWT.2016070107

Chicago

Ismail, Suhaila, Elena Sitnikova, and Jill Slay. "SCADA Systems Cyber Security for Critical Infrastructures: Case Studies in Multiple Sectors," International Journal of Cyber Warfare and Terrorism (IJCWT) 6, no.3: 79-95. http://doi.org/10.4018/IJCWT.2016070107

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Past cyber-attacks on Supervisory Control and Data Acquisition (SCADA) Systems for Critical infrastructures have left these systems compromised and caused financial and economic problems. Deliberate attacks have resulted in denial of services and physical injury to the public in certain cases. This study explores the past attacks on SCADA Systems by examining nine case studies across multiple utility sectors including transport, energy and water and sewage sector. These case studies will be further analysed according to the cyber-terrorist decision-making theories including strategic, organisational and psychological theories based on McCormick (2000). Next, this study will look into cyber-terrorist capabilities in conducting attacks according to Nelson's (1999) approach that includes simple-unstructured, advance-structured and complex-coordinated capabilities. The results of this study will form the basis of a guideline that organisations can use so that they are better prepared in identifying potential future cybersecurity attacks on their SCADA systems.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.