A new method for recognizing operating systems of automation devices
ETFA'09 Proceedings of the 14th IEEE international conference on Emerging technologies & factory automation
CRITIS'09 Proceedings of the 4th international conference on Critical information infrastructures security
Application filters for TCP/IP industrial automation protocols
CRITIS'09 Proceedings of the 4th international conference on Critical information infrastructures security
Application of kohonen maps to improve security tests on automation devices
CRITIS'07 Proceedings of the Second international conference on Critical Information Infrastructures Security
Hi-index | 0.00 |
SCADA (Supervisory Control and Data Acquisition) systems play an important role in industrial process. In the past, these used to be stand-alone models, with closed architecture, proprietary protocols and no external connectivity. Nowadays, SCADA rely on wide connectivity and open systems and are connected to corporate intranets and to the Internet for improve efficiency and productivity. SCADA networks connected to corporate networks brought some new seecurity related challenges. This paper presents an overview of the security aspects of this interconnection.