• Medientyp: E-Artikel
  • Titel: Beware of SCADA System Vulnerability
  • Beteiligte: Brilliant, Mark; Mains, Ken
  • Erschienen: Wiley, 2010
  • Erschienen in: Opflow, 36 (2010) 5, Seite 8-8
  • Sprache: Englisch
  • DOI: 10.1002/j.1551-8701.2010.tb03015.x
  • ISSN: 0149-8029; 1551-8701
  • Schlagwörter: Pharmaceutical Science
  • Entstehung:
  • Anmerkungen:
  • Beschreibung: This article begins by providing a brief overview of how automated hacking programs exploit computer systems. The article lists the characteristics of an ideal host computer that allow a hacking program to imbed a small remote access and control application, turning the infected computer system into a “zombie” that remains dormant while awaiting instructions from its master. A water or wastewater supervisory control and data acquisition (SCADA) system usually satisfies these ideal conditions. The most vulnerable are small and medium‐size SCADA systems that are connected to the Internet for data transfer and control needs. The article provides guidelines for protecting SCADA systems from hackers, and recommends avoiding Internet connectivity if at all possible, along with developing a Workplace Hazardous Materials Information System for the Internet that defines proper rules and regulations.