EconPapers    
Economics at your fingertips  
 

SCADA Systems Cyber Security for Critical Infrastructures: Case Studies in Multiple Sectors

Suhaila Ismail, Elena Sitnikova and Jill Slay
Additional contact information
Suhaila Ismail: School of Information Technology and Mathematical Sciences, University of South Australia, Adelaide, Australia
Elena Sitnikova: Australian Centre for Cyber Security (ACCS), University of New South Wales at ADFA, Canberra, Australia
Jill Slay: Australian Centre for Cyber Security (ACCS), University of New South Wales at ADFA, Canberra, Australia

International Journal of Cyber Warfare and Terrorism (IJCWT), 2016, vol. 6, issue 3, 79-95

Abstract: Past cyber-attacks on Supervisory Control and Data Acquisition (SCADA) Systems for Critical infrastructures have left these systems compromised and caused financial and economic problems. Deliberate attacks have resulted in denial of services and physical injury to the public in certain cases. This study explores the past attacks on SCADA Systems by examining nine case studies across multiple utility sectors including transport, energy and water and sewage sector. These case studies will be further analysed according to the cyber-terrorist decision-making theories including strategic, organisational and psychological theories based on McCormick (2000). Next, this study will look into cyber-terrorist capabilities in conducting attacks according to Nelson's (1999) approach that includes simple-unstructured, advance-structured and complex-coordinated capabilities. The results of this study will form the basis of a guideline that organisations can use so that they are better prepared in identifying potential future cybersecurity attacks on their SCADA systems.

Date: 2016
References: Add references at CitEc
Citations: Track citations by RSS feed

Downloads: (external link)
http://services.igi-global.com/resolvedoi/resolve. ... 018/IJCWT.2016070107 (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:igg:jcwt00:v:6:y:2016:i:3:p:79-95

Access Statistics for this article

More articles in International Journal of Cyber Warfare and Terrorism (IJCWT) from IGI Global
Bibliographic data for series maintained by Journal Editor ().

 
Page updated 2019-11-24
Handle: RePEc:igg:jcwt00:v:6:y:2016:i:3:p:79-95