IT Security for SCADA: A Position Paper.
Rahul RastogiRossouw von SolmsPublished in: Int. J. Cyber Warf. Terror. (2015)
Keyphrases
- key management
- cyber security
- critical infrastructure
- intrusion detection
- security issues
- information security
- enterprise network
- security systems
- future directions
- smart grid
- security requirements
- network security
- computer security
- information assurance
- security mechanisms
- security threats
- supervisory control
- access control
- control system
- security policies
- security level
- security problems
- decision makers
- risk analysis
- neural network
- functional requirements
- homeland security
- statistical databases
- security protocols
- risk assessment
- security properties
- data processing
- high speed