DocumentCode
2883704
Title
Stuxnet worm impact on industrial cyber-physical system security
Author
Karnouskos, Stamatis
Author_Institution
SAP Res., Karlsruhe, Germany
fYear
2011
fDate
7-10 Nov. 2011
Firstpage
4490
Lastpage
4494
Abstract
Industrial systems consider only partially security, mostly relying on the basis of “isolated” networks, and controlled access environments. Monitoring and control systems such as SCADA/DCS are responsible for managing critical infrastructures operate in these environments, where a false sense of security assumptions is usually made. The Stuxnet worm attack demonstrated widely in mid 2010 that many of the security assumptions made about the operating environment, technological capabilities and potential threat risk analysis are far away from the reality and challenges modern industrial systems face. We investigate in this work the highly sophisticated aspects of Stuxnet, the impact that it may have on existing security considerations and pose some thoughts on the next generation SCADA/DCS systems from a security perspective.
Keywords
SCADA systems; critical infrastructures; invasive software; SCADA-DCS systems; Stuxnet worm impact; controlled access environments; critical infrastructure management; industrial cyber-physical system security; isolated networks; threat risk analysis; Grippers; Hardware; Internet; Monitoring; Process control; Security; Software;
fLanguage
English
Publisher
ieee
Conference_Titel
IECON 2011 - 37th Annual Conference on IEEE Industrial Electronics Society
Conference_Location
Melbourne, VIC
ISSN
1553-572X
Print_ISBN
978-1-61284-969-0
Type
conf
DOI
10.1109/IECON.2011.6120048
Filename
6120048
Link To Document