Title :
Next generation SCADA security: best practices and client puzzles
Author :
Bowen, Calvert L., III ; Buennemeyer, Timothy K. ; Thomas, Ryan W.
Author_Institution :
Bradley Dept. of Electr. & Comput. Eng., Virginia Polytech. Inst. & State Univ., USA
Abstract :
Supervisory control and data acquisition (SCADA) systems are found throughout the public utility industry. As part of our national critical infrastructure, SCADA systems are used to monitor, control and manage spatially separated utility sites. SCADA systems are mirroring the rapid changes occurring in the larger information technology (IT) and networking industry by becoming more flexible and at the same time more interconnected. These primitive systems are being upgraded using commercial-off-the-shelf (COTS) hardware and software, and are being migrated to standard data formats and network protocols, particularly transport control protocol (TCP) for end-to-end control. Throughout this transition, SCADA system networks must be well defended and maintain the level of service required by their customers.
Keywords :
SCADA systems; data structures; public utilities; security of data; transport protocols; SCADA security; TCP; data format; end-to-end control; information technology; management; monitoring; network protocol; networking industry; public utility industry; spatially separated utility sites; supervisory control and data acquisition; transport control protocol; Best practices; Control systems; Data security; Electrical equipment industry; Industrial control; Information technology; Monitoring; National security; SCADA systems; Transport protocols;
Conference_Titel :
Information Assurance Workshop, 2005. IAW '05. Proceedings from the Sixth Annual IEEE SMC
Print_ISBN :
0-7803-9290-6
DOI :
10.1109/IAW.2005.1495984