A Study on the Security Management for Critical Key Infrastructure(SCADA) 


Vol. 30,  No. 8, pp. 838-848, Aug.  2005


PDF
  Abstract

Most of the national critical key infrastructure, such as power, piped gas and water supply facilities, or the high-speed railroad, is run on the SCADA system. Recently, concerns have been raised about the possibility of these facilities being attacked by cyber terrorists, hacking, or viruses. Thus, it is time to adopt the relevant security management techniques.
This paper attempts to propose such security management techniques, including information protection measures and troubleshooting, based on a risk analysis process concerning assets, threats/vulnerability, and hazards, and to examine the security management status of critical key infrastructure in the U.S. and Japan.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

I. Kim, Y. Chung, J. Koh, D. Won, "A Study on the Security Management for Critical Key Infrastructure(SCADA)," The Journal of Korean Institute of Communications and Information Sciences, vol. 30, no. 8, pp. 838-848, 2005. DOI: .

[ACM Style]

InJung Kim, YoonJung Chung, JaeYoung Koh, and Dongho Won. 2005. A Study on the Security Management for Critical Key Infrastructure(SCADA). The Journal of Korean Institute of Communications and Information Sciences, 30, 8, (2005), 838-848. DOI: .

[KICS Style]

InJung Kim, YoonJung Chung, JaeYoung Koh, Dongho Won, "A Study on the Security Management for Critical Key Infrastructure(SCADA)," The Journal of Korean Institute of Communications and Information Sciences, vol. 30, no. 8, pp. 838-848, 8. 2005.