Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

The methodology for hardening SCADA security using countermeasure ordering

Authors
Kim S.-H.[Kim S.-H.]Park M.-W.[Park M.-W.]Eom J.-H.[Eom J.-H.]Chung T.-M.[Chung T.-M.]
Issue Date
2013
Keywords
Ordered countermeasure; Penetration success probability; Security hardening
Citation
Lecture Notes in Electrical Engineering, v.240 LNEE, pp.485 - 492
Indexed
SCOPUS
Journal Title
Lecture Notes in Electrical Engineering
Volume
240 LNEE
Start Page
485
End Page
492
URI
https://scholarworks.bwise.kr/skku/handle/2021.sw.skku/62562
DOI
10.1007/978-94-007-6738-6_59
ISSN
1876-1100
Abstract
In this paper, we considered that SCADA system has few authorized users and access control is one of the most important values for cyber security. We propose the method which reducing the success probability of attacker's penetration using ordered countermeasures. We assume that any system has two or more safety countermeasures for authentication. It follows that setting multiple countermeasures in chain and making a causal relationship before and after action. And then, we making an access procedure matrix for it and sharing them among authorized users. As doing so, we can prevent attacker's penetration and reduce risk level by hacking. © 2013 Springer Science+Business Media Dordrecht(Outside the USA).
Files in This Item
There are no files associated with this item.
Appears in
Collections
Information and Communication Engineering > Department of Computer Engineering > 1. Journal Articles
Computing and Informatics > Computer Science and Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE