Survey of SCADA security challenges and potential attack vectors.
Robert E. Johnson IIIPublished in: ICITST (2010)
Keyphrases
- cyber attacks
- cyber security
- key management
- security problems
- security measures
- security risks
- critical infrastructure
- security issues
- information security
- security concerns
- key exchange protocol
- network security
- security vulnerabilities
- computer security
- countermeasures
- intrusion detection
- secret key
- authentication protocol
- denial of service attacks
- access control
- control system
- information leakage
- fault injection
- attack scenarios
- penetration testing
- ddos attacks
- security policies
- privacy issues
- smart grid
- attack detection
- security requirements
- network traffic
- intrusion detection system
- information sharing
- feature vectors
- security and privacy issues