Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
139 tokens/sec
GPT-4o
47 tokens/sec
Gemini 2.5 Pro Pro
43 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Convergence of IT and SCADA: Associated Security Threats and Vulnerabilities (2005.04047v1)

Published 8 May 2020 in cs.CR

Abstract: As many industries shift towards centralised controlled information systems for monitoring and control, more importance is being placed upon technologies such as Supervisory Control and Data Acquisitions industrial systems (SCADA). This focus on integration and interoperability presents numerous challenges for security personnel and organisational management alike. It becomes paramount therefore to reciprocate this new direction within an organisation with adequate plans and frameworks that ensure protection and security of its SCADA architecture. A clear understanding of the relevant threats and vulnerabilities is critical for adopting/developing appropriate policy and frameworks. To this end, in this research we identify and analyse relevant SCADA security threats and vulnerabilities and present a simple scheme to classify them for better understanding.

Citations (2)

Summary

We haven't generated a summary for this paper yet.