Stuxnet worm impact on industrial cyber-physical system security

S Karnouskos - IECON 2011-37th Annual Conference of the …, 2011 - ieeexplore.ieee.org
IECON 2011-37th Annual Conference of the IEEE Industrial …, 2011ieeexplore.ieee.org
Industrial systems consider only partially security, mostly relying on the basis of “isolated”
networks, and controlled access environments. Monitoring and control systems such as
SCADA/DCS are responsible for managing critical infrastructures operate in these
environments, where a false sense of security assumptions is usually made. The Stuxnet
worm attack demonstrated widely in mid 2010 that many of the security assumptions made
about the operating environment, technological capabilities and potential threat risk analysis …
Industrial systems consider only partially security, mostly relying on the basis of “isolated” networks, and controlled access environments. Monitoring and control systems such as SCADA/DCS are responsible for managing critical infrastructures operate in these environments, where a false sense of security assumptions is usually made. The Stuxnet worm attack demonstrated widely in mid 2010 that many of the security assumptions made about the operating environment, technological capabilities and potential threat risk analysis are far away from the reality and challenges modern industrial systems face. We investigate in this work the highly sophisticated aspects of Stuxnet, the impact that it may have on existing security considerations and pose some thoughts on the next generation SCADA/DCS systems from a security perspective.
ieeexplore.ieee.org