An assessment of the application of IT security mechanisms to industrial control systems Online publication date: Fri, 06-Oct-2017
by Allan Cook; Helge Janicke; Leandros Maglaras; Richard Smith
International Journal of Internet Technology and Secured Transactions (IJITST), Vol. 7, No. 2, 2017
Abstract: Industrial control systems (ICS) are increasingly becoming the target of cyber attacks. In order to counter this threat, organisations are turning to traditional IT security mechanisms to protect their operations. However, ICS includes a range of technologies which are often unfamiliar to contemporary IT security professionals or the tools they deploy. This paper explores the applicability of these tools within an ICS and critically analyses contemporary ICS architectures. The contribution of this paper is a clear identification of the areas of ICS to which IT security mechanisms can be applied and the challenges that are faced in the others. The paper continues to explore what mechanisms may be considered in these non-traditional areas of technology.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Internet Technology and Secured Transactions (IJITST):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com