Summary and Info
Supervisory control and data acquisition (SCADA) networks perform key functions to provide essential services and commodities suchas energy, utilities, defense and communication system of a country. SCADA is a part of a nation’s critical infrastructure and operates with thesupport of industrial control systems, sensor networks, advanced information and communication technologies. SCADA networks are potentiallyvulnerable to various types of malicious attacks which may affect the safety of common people and the performance of critical infrastructureseriously and may cause huge financial loss. An efficient SCADA system is expected to be a resilient system. The resiliency measures the abilityto and the speed at which a SCADA system can return to normal performance level following a disruption. The vulnerability of a SCADA systemto a disruptive event can be viewed as a combination of likelihood of a disruption and its potential severity. This paper explores a set ofverification mechanisms to check the security intelligence of a resilient SCADA system. SCADA system can be checked through intrusion,device attestation, secure communication, inference control and credential access control verification mechanisms. These verificationmechanisms are analyzed in the context of a smart intelligent energy grid.Keywords: SCADA, Security intelligence, Resiliency, Verification mechanisms, Model checking.
Review and Comments
Rate the Book
Verification of security intelligence for a resilient SCADA system 0 out of 5 stars based on 0 ratings.