SCADA Systems Cyber Security for Critical Infrastructures: Case Studies in Multiple Sectors
Elena Sitnikova and
Additional contact information
Suhaila Ismail: School of Information Technology and Mathematical Sciences, University of South Australia, Adelaide, Australia
Elena Sitnikova: Australian Centre for Cyber Security (ACCS), University of New South Wales at ADFA, Canberra, Australia
Jill Slay: Australian Centre for Cyber Security (ACCS), University of New South Wales at ADFA, Canberra, Australia
International Journal of Cyber Warfare and Terrorism (IJCWT), 2016, vol. 6, issue 3, 79-95
Past cyber-attacks on Supervisory Control and Data Acquisition (SCADA) Systems for Critical infrastructures have left these systems compromised and caused financial and economic problems. Deliberate attacks have resulted in denial of services and physical injury to the public in certain cases. This study explores the past attacks on SCADA Systems by examining nine case studies across multiple utility sectors including transport, energy and water and sewage sector. These case studies will be further analysed according to the cyber-terrorist decision-making theories including strategic, organisational and psychological theories based on McCormick (2000). Next, this study will look into cyber-terrorist capabilities in conducting attacks according to Nelson's (1999) approach that includes simple-unstructured, advance-structured and complex-coordinated capabilities. The results of this study will form the basis of a guideline that organisations can use so that they are better prepared in identifying potential future cybersecurity attacks on their SCADA systems.
References: Add references at CitEc
Citations: Track citations by RSS feed
Downloads: (external link)
http://services.igi-global.com/resolvedoi/resolve. ... 018/IJCWT.2016070107 (application/pdf)
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
Persistent link: https://EconPapers.repec.org/RePEc:igg:jcwt00:v:6:y:2016:i:3:p:79-95
Access Statistics for this article
More articles in International Journal of Cyber Warfare and Terrorism (IJCWT) from IGI Global
Bibliographic data for series maintained by Journal Editor ().