Stock Status: In Stock
Governments and industry organizations, including ISA, have recognized that Supervisory Control and Data Acquisition (SCADA), Distributed Control Systems (DCS), and other process control networks, referred to as SCADA networks in this paper, are potential targets of attack from hackers, disgruntled insiders, cyber terrorists, and others who want to disrupt the critical infrastructure.This paper describes how current intrusion detection and cyber security monitoring products and services used in IT enterprise networks can provide early identification of attacks from the most common threat agents. The deficiencies of the current general IT solutions are discussed, and future SCADA specific solutions are described. Special emphasis is placed on how intrusion detection can serve as a compensating security control for the lack of security in field communications.
- Downloadable files require Adobe Acrobat Reader.
All contents copyright of ISA © 1995-2013 All rights reserved.