Submitted manuscript, 97.4 KB, PDF document
Research output: Other contribution
Research output: Other contribution
}
TY - GEN
T1 - Protection against Cyber Attacks
T2 - Introducing Resilience for SCADA Networks
AU - Gouglidis, Antonios
AU - Hutchison, David
PY - 2017/3
Y1 - 2017/3
N2 - The sovereignty of nations is highly dependent on the continuous and uninterrupted operation of critical infrastructures. Recent security incidents on SCADA networks show that threats in these environments are increasing in sophistication and number. To protect critical infrastructures against cyber attacks and to cope with their complexity, we advocate the application of a resilience strategy. This strategy provides the guidelines and processes to investigate and ensure the resilience of systems. In this abstract, we briefly refer to our definition of resilience, our research work on the verification of resilience policies, and our resilience architecture for protecting SCADA networks against cyber attacks.
AB - The sovereignty of nations is highly dependent on the continuous and uninterrupted operation of critical infrastructures. Recent security incidents on SCADA networks show that threats in these environments are increasing in sophistication and number. To protect critical infrastructures against cyber attacks and to cope with their complexity, we advocate the application of a resilience strategy. This strategy provides the guidelines and processes to investigate and ensure the resilience of systems. In this abstract, we briefly refer to our definition of resilience, our research work on the verification of resilience policies, and our resilience architecture for protecting SCADA networks against cyber attacks.
M3 - Other contribution
PB - AIT Austrian Institute of Technology GmbH
ER -