Access the full text.
Sign up today, get DeepDyve free for 14 days.
T. Marsden, Nour Moustafa, E. Sitnikova, Gideon Creech (2017)
Probability Risk Identification Based Intrusion Detection System for SCADA Systems
K. Coffey, Richard Smith, L. Maglaras, H. Janicke (2018)
Vulnerability Analysis of Network Scanning on SCADA SystemsSecur. Commun. Networks, 2018
S. Samtani, Shuo Yu, Hongyi Zhu, Mark Patton, Hsinchun Chen (2016)
Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques2016 IEEE Conference on Intelligence and Security Informatics (ISI)
Wenye Wang, Zhuo Lu (2013)
Cyber security in the Smart Grid: Survey and challengesComput. Networks, 57
A. Cook, H. Janicke, Richard Smith, L. Maglaras (2017)
The industrial control system cyber defence triage processComput. Secur., 70
Vitor Graveto, Luís Rosa, T. Cruz, P. Simões (2019)
A stealth monitoring mechanism for cyber-physical systemsInt. J. Crit. Infrastructure Prot., 24
H. Khurana, Mark Hadley, N. Lu, D. Frincke (2010)
Smart-grid security issuesIEEE Security & Privacy, 8
Yichi Zhang, Lingfeng Wang, Yingmeng Xiang, C. Ten (2015)
Power System Reliability Evaluation With SCADA Cybersecurity ConsiderationsIEEE Transactions on Smart Grid, 6
Abebe Tesfahun, D. Bhaskari (2016)
A SCADA testbed for investigating cyber security vulnerabilities in critical infrastructuresAutomatic Control and Computer Sciences, 50
Chiara Foglietta, Dario Masucci, Cosimo Palazzo, Riccardo Santini, S. Panzieri, Luís Rosa, T. Cruz, Leonid Lev (2019)
From Detecting Cyber-Attacks to Mitigating Risk Within a Hybrid EnvironmentIEEE Systems Journal, 13
S. Nazir, Shushma Patel, D. Patel (2017)
Assessing and augmenting SCADA cyber security: A survey of techniquesComput. Secur., 70
(2017)
Review on SCADA cybersecurity for critical infrastructures
A. Ashok, A. Hahn, M. Govindarasu (2013)
Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environmentJournal of Advanced Research, 5
Li Yang, Xiedong Cao, Xinyu Geng (2019)
A novel intelligent assessment method for SCADA information security risk based on causality analysisCluster Computing
A. Poletykin (2018)
Cyber Security Risk Assessment Method for SCADA of Industrial Control Systems2018 International Russian Automation Conference (RusAutoCon)
P. Woo, Balho Kim, D. Hur (2015)
Towards Cyber Security Risks Assessment in Electric Utility SCADA SystemsJournal of Electrical Engineering & Technology, 10
A. Ştefanov, Chen-Ching Liu, M. Govindarasu, Shinn-Shyan Wu (2015)
SCADA modeling for performance and vulnerability assessment of integrated cyber–physical systemsInternational Transactions on Electrical Energy Systems, 25
Yulia Cherdantseva, P. Burnap, A. Blyth, Peter Eden, K. Jones, H. Soulsby, Kristan Stoddart (2016)
A review of cyber security risk assessment methods for SCADA systemsComput. Secur., 56
PurposeSupervisory control and data acquisition (SCADA) systems security is of paramount importance, and there should be a holistic approach to it, as any gap in the security will lead to critical national-level disaster. The purpose of this paper is to present the case study of security gaps assessment of SCADA systems of electricity utility company in the Sultanate of Oman against the regulatory standard and security baseline requirements published by the Authority for Electricity Regulation (AER), Government of Sultanate of Oman.Design/methodology/approachThe security gaps assessment presented in this paper are based on the security baseline requirements that include core areas, controls for each core area and requirements for each control.FindingsThe paper provides the security gaps assessment summary of SCADA systems of electricity utility company.Practical implicationsThe summary of threats and vulnerabilities presented will help stakeholders to be proactive rather than reactive in the event of any attack.Originality/valueThis case study discusses the various security challenges in smart grid based on SCADA systems and provides the summary of challenges and recommendations to overcome the same.
Information and Computer Security – Emerald Publishing
Published: Jul 8, 2019
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.