Developing a Strategic Framework for Managing Security in SCADA Systems

ABSTRACT

The Internet, originally an open distributed system, has gradually evolved into a complex network as a platform for global connectivity. Today, the Internet hosts complex electronic and engineering systems (such as Supervisory Control and Data Acquisition – SCADA – systems) deployed to manage critical infrastructures. The Internet has become a platform for transporting high volumes of critical information worldwide. Securing sensitive information and safeguarding operations of critical infrastructure management systems has become critical. SCADA systems are deployed, complex operations that play a vital role in managing critical resources. This paper elaborates on the need for a holistic approach for managing the security of complex infrastructures and recommends a strategic model for security management of SCADA systems.


AUTHORS

Photo of Mehdi Asgarkhani

Department of Computing CPIT Christchurch
New Zealand

Mehdi Asgarkhani is the Academic Leader and Principal Lecturer at CPIT New Zealand. He is the National Councillor at Institute of IT Professionals NZ. Previously, he has had various roles within the ICT sector. He holds editorial board memberships within two international journals. His experience within the IT industry includes roles such as Business Support Services, Business Strategy Analyst/Advisor, Project Director and ICT solutions consultant.

Photo of Elena Sitnikova

School of Information Technology and Mathematical Science University of South Australia,
Australia

Elena Sitnikova PhD, BE (Hons), CSSLP is an experienced researcher and academic from the University of South Australia. Prior to joining the university she worked in the IT and Space industry. She has a broad knowledge of software and systems engineering, quality assurance and enterprise process capability. Her current research interests include critical infrastructure protection and SCADA systems cybersecurity.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com