Abstract
Until recently, Industrial Automation and Control Systems (IACS) were largely isolated from corporate systems by means of proprietary protocols, which facilitated their protection against cyber-attacks under the principle of security through obscurity. However, the widespread adoption of the new communication technologies, such as the Internet protocols and wireless communications has changed this scenario.
 
 During recent years there have been many evidences of cyber-attacks to IACS that exploit their vulnerabilities. Unfortunately, these attacks have increased significantly during the last five years, and we should be aware that only the tip of the iceberg comes to the public knowledge.
 
 The purpose of this article is twofold: (1) to raise awareness about the security vulnerabilities that most companies are facing at their IACS and (2) to set a starting point by proposing a roadmap that seeks to guide designers and programmers in the new and complex world of industrial cyber-security.
Highlights
C:I 76H:9 HDAJI>DCH L=>A: >BEGDK>C< I=: 6JIDB6I>DC EGD 8:HH:H >C DE:G6I>DC6A I:GBH 34 >C8AJ9>C< I=: G:BDI: HJE:GK>H>DC 6C9 BDC>IDG>C< D; I=: >C9JHIG>6A EGD8:HH:H C< I=: ;ADL D; >C;DGB6I>DC 6C9 G:6A I>B: E:G
=: >CIGD9J8I>DC D; C:L I:8=CDAD:H 6C9 9>;;:G:CI INE:H D; 8DBBJC>86I>DC HNHI:BH >C >C9JHIG>6A :CK>GDC B:CIH =6H EGD9J8:9 6 H>;>86CI EGDC I=: ;>:A9 D; JIDB6I>DC 6C9 DCIGDA
&:ILDG@ 6G8=>I:8IJG:H JH:9 >C >C9JHIG>6A 6JIDB6I>DC HNHI:BH 9>;;:G ;GDB I=DH: JH:9 6I D;;>8:
Summary
C:I 76H:9 HDAJI>DCH L=>A: >BEGDK>C< I=: 6JIDB6I>DC EGD 8:HH:H >C DE:G6I>DC6A I:GBH 34 >C8AJ9>C< I=: G:BDI: HJE:GK>H>DC 6C9 BDC>IDG>C< D; I=: >C9JHIG>6A EGD8:HH:H C< I=: ;ADL D; >C;DGB6I>DC 6C9 G:6A I>B: E:G =: >CIGD9J8I>DC D; C:L I:8=CDAD:H 6C9 9>;;:G:CI INE:H D; 8DBBJC>86I>DC HNHI:BH >C >C9JHIG>6A :CK>GDC B:CIH =6H EGD9J8:9 6 H>;>86CI EGDC I=: ;>:A9 D; JIDB6I>DC 6C9 DCIGDA
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Online Engineering (iJOE)
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.