International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 116 | Views: 283

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 2, February 2015 | Popularity: 6.7 / 10


     

Security Measures in SCADA Systems

Steffi Paul Kalib, Manoj K. Rawat


Abstract: In the past few years the security issues in the supervisory control and data acquisition (SCADA) system have been widely investigated, and many security mechanisms have been proposed from research communities. The international standard organizations also have published several standard documents for secured SCADA systems. In this paper, we overview the SCADA system architecture and consider the constraints due to the systems own characteristics. And then, we explain the technological challenges for the SCADA security and summarize the current results which have been brought out by the efforts from the international bodies as well as research communities.


Keywords: SCADA, Industrial control system, Network security, Digital forensics


Edition: Volume 4 Issue 2, February 2015


Pages: 1544 - 1551



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Steffi Paul Kalib, Manoj K. Rawat, "Security Measures in SCADA Systems", International Journal of Science and Research (IJSR), Volume 4 Issue 2, February 2015, pp. 1544-1551, https://www.ijsr.net/getabstract.php?paperid=SUB151556



Similar Articles

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1253 - 1257

A Trust System for SCADA Network Using Wireless Sensor Based on Node Behaviors

B.Padmini, N. Chandra Shekar Reddy, Ch. Mukunda Reddy

Share this Article

Downloads: 110

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1404 - 1408

A Joint Forensic System to Detect Image Forgery using Copy Move Forgery Detection and Double JPEG Compression Approaches

Dhara Anandpara, Rohit Srivastava

Share this Article

Downloads: 117

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2452 - 2455

A Review on Big Data Management and NoSQL Databases in Digital Forensics

Nikhil Mangle, Prof. Praful B. Sambhare

Share this Article

Downloads: 120 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2024 - 2027

A Survey on Corrupted Video Recovery Using CODEC Specifications

Avinash Deshmukh, Manisha Desai

Share this Article

Downloads: 130

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 927 - 929

A Survey Paper on Revealing Image Forgery Using Image Manipulation Detection

Deepak B. Waghchaure, Ashish R. Gaikwad

Share this Article



Top