A Study of Effective Defense-In-Depth Strategy of Cyber Security on ICS
- Authors
- Choi, Seong-Muk; Kim, Rae-Hyung; Kim, Ga-Ye; Lee, Hyeon-Kyung; Gim, GwangYong; Kim, Jong-Bae
- Issue Date
- May-2016
- Publisher
- SCIENCE & ENGINEERING RESEARCH SUPPORT SOC
- Keywords
- SCADA; ICS; Defense-In-Depth Strategy; Security Control; Cyber Security
- Citation
- INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, v.10, no.5, pp.235 - 242
- Journal Title
- INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS
- Volume
- 10
- Number
- 5
- Start Page
- 235
- End Page
- 242
- URI
- http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/5554
- DOI
- 10.14257/ijsia.2016.10.5.22
- ISSN
- 1738-9976
- Abstract
- The system of SCADA(Supervisory Control and Data Acquisition Security) used in electricity, water, petroleum and gas, transportation as well as manufacturing, is to collect scattered data and to monitor assets related as a centralized suppression system. ICS system, including current SCADA, is not isolated from outside, being connected with IT solution, and can operate equipment through broadband network, instead of accessing physically. Accordingly, the security accident of suppressing system can occur in the fields of antagonistic nations, terrorists, foundational facility invaders, natural disasters and ill-will or accidental actions. The security control examined in this study provides a defense-in-depth strategy which is applicable to the effective cyber security strategy regarding ICS to protect the confidentiality of information, zero defect, availability through the classification of control, operational control and technological control.
- Files in This Item
-
Go to Link
- Appears in
Collections - Graduate School of Software > Major in Software > 1. Journal Articles
- College of Business Administration > School of Business Administration > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.