International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064




Downloads: 116

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 2, February 2015


Security Measures in SCADA Systems

Steffi Paul Kalib | Manoj K. Rawat


Abstract: In the past few years the security issues in the supervisory control and data acquisition (SCADA) system have been widely investigated, and many security mechanisms have been proposed from research communities. The international standard organizations also have published several standard documents for secured SCADA systems. In this paper, we overview the SCADA system architecture and consider the constraints due to the systems own characteristics. And then, we explain the technological challenges for the SCADA security and summarize the current results which have been brought out by the efforts from the international bodies as well as research communities.


Keywords: SCADA, Industrial control system, Network security, Digital forensics


Edition: Volume 4 Issue 2, February 2015,


Pages: 1544 - 1551


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Steffi Paul Kalib, Manoj K. Rawat, "Security Measures in SCADA Systems", International Journal of Science and Research (IJSR), Volume 4 Issue 2, February 2015, pp. 1544-1551, https://www.ijsr.net/get_abstract.php?paper_id=SUB151556



Similar Articles with Keyword 'Network security'

Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Informative Article, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022

Pages: 1497 - 1500

Innovative Approach to Mitigate Man-in-the-Middle Attacks in Secure Communication Channels

Arnab Dey [9]

Share this Article

Downloads: 4 | Weekly Hits: ⮙2 | Monthly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024

Pages: 779 - 789

Machine Learning-Based Detection of Synonymous IP Flood Attacks on Server Infrastructure

Surbhi Batra | Chandra Sekhar Dash

Share this Article



Top