본문 바로가기
  • Home

The Response Method for SCADA System Threats

  • Journal of Knowledge Information Technology and Systems
  • Abbr : JKITS
  • 2012, 7(1), pp.119-127
  • Publisher : Korea Knowledge Information Technology Society
  • Research Area : Interdisciplinary Studies > Interdisciplinary Research
  • Published : February 29, 2012

정현미 1 한경수 1 LEE GANG SOO 1

1한남대학교

Accredited

ABSTRACT

Recently, nuclear power, electricity, steel, semiconductors, chemicals, airports, dams, and other major industrial facilities are under threatened through the appearance of Stuxnet which is a malicious code to be aimed SCADA systems. If the national infrastructure were invaded by a foreign force in some way or other, there could be really devastating effects on our daily lives at all on-offline. Therefore, we need to make provisions for this problem by threat-case analysis before the invasion is occurred, and countermeasures considering future risks are needed after the national infrastructure is invaded. Hence, in this paper, we analyzed about the case of SCADA system threats and discussed its response methods.

Citation status

* References for papers published after 2023 are currently being built.