Skip to main content

Part of the book series: Advances in Information Security ((ADIS,volume 66))

Abstract

The term Industrial Control System (ICS) refers to a variety of systems comprised of computers, electrical and mechanical devices, and manual processes overseen by humans; they perform automated or partially automated control of equipment in manufacturing and chemical plants, electric utilities, distribution and transportation systems and many other industries.

Edward J.M. Colbert - Also ICF International, Inc.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Supervisory Control and Data Acquisition (SCADA) systems are a sub-class of ICSs in which control is performed over multiple, distributed individual lower-level control systems (hence the word “supervisory”). See Chap. 2 for a more detailed discussion of the different types of ICSs.

References

  • Cardenas, A.A. (2008). Secure control: Towards survivable cyber-physical systems. In The 28th International Conference on Distributed Computing Systems Workshops (pp. 495–500). IEEE.

    Google Scholar 

  • Executive Order No. 13636. (2013). Improving critical infrastructure cybersecurity. Retrieved from http://www.gpo.gov/fdsys/pkg/FR-2013-02-19/pdf/2013-03915.pdf.

  • IEC TS 62443-1-1. (2009). Security for industrial automation and control systems—Models and concepts. IEC, International Electrotechnical Commission.

    Google Scholar 

  • Stouffer, K., Lightman, S., Pillitteri, V., Abrams, M., & Hahn, A. (2015). Guide to industrial control systems (ICS) security. NIST Special Publication 800-82 Revision 2.

    Google Scholar 

  • Knapp, E. D. (2012). Industrial control systems cybersecurity proof of concept. In Department of Homeland Security Industrial Control Systems Joint Working Group Spring Conference, Savannah, GA.

    Google Scholar 

  • Krotofil, M. (2015). Rocking the pocket book: Hacking chemical plants. In DefCon Conference, DEFCON.

    Google Scholar 

  • Langner, R. (2011). Stuxnet: Dissecting a cyberwarfare weapon. IEEE Security & Privacy, 9(3), 49–51.

    Article  Google Scholar 

  • Lüders, S. (2005). Control systems under attack? 10th ICALEPCS international conference on accelerator and large experimental physics control systems (pp. FR2.4–6O). Geneva: CERN. Retrieved November 8, 2015, from https://accelconf.web.cern.ch/accelconf/ica05/proceedings/pdf/O5_008.pdf.

  • NIST. (2014). Framework for improving critical infrastructure cybersecurity. NIST, National Institute of Standards and Technology.

    Google Scholar 

  • Nizar, A.H. (2009). Identification and detection of electricity customer behaviour irregularities. In Nizar, A.H., & Dong, Z.Y. (Eds.), Power systems conference and exposition. PSCE’09. IEEE/PES (pp. 1–10). IEEE.

    Google Scholar 

  • US Department of Energy. (2002). 21 steps to improve cyber security of SCADA networks. Washington, DC: US Department of Energy. Retrieved from http://energy.gov/sites/prod/files/oeprod/DocumentsandMedia/21_Steps_-_SCADA.pdf.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alexander Kott .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Kott, A., Aguayo Gonzalez, C., Colbert, E.J.M. (2016). Introduction and Preview. In: Colbert, E., Kott, A. (eds) Cyber-security of SCADA and Other Industrial Control Systems. Advances in Information Security, vol 66. Springer, Cham. https://doi.org/10.1007/978-3-319-32125-7_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-32125-7_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-32123-3

  • Online ISBN: 978-3-319-32125-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics