Please use this identifier to cite or link to this item:
http://dspace.uniten.edu.my/jspui/handle/123456789/11202
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jamil, N. | en_US |
dc.contributor.author | Qassim, Q. | en_US |
dc.contributor.author | Daud, M. | en_US |
dc.contributor.author | Abidin, I.Z. | en_US |
dc.contributor.author | Jaaffar, N. | en_US |
dc.contributor.author | Kamarulzaman, W.A.W. | en_US |
dc.date.accessioned | 2018-12-07T00:32:51Z | - |
dc.date.available | 2018-12-07T00:32:51Z | - |
dc.date.issued | 2018 | - |
dc.identifier.uri | http://dspace.uniten.edu.my/jspui/handle/123456789/11202 | - |
dc.description.abstract | The impact from Stuxnet worm to SCADA systems in 2010 has been one of the most significant signals of a well-coordinated cyber-Attack is now towards disrupting national critical infrastructures such as power grid governed by SCADA system. The discovery of this worm has put a lot of attention on the strength and security level of security countermeasures of existing critical infrastructure systems such as SCADA that has been long used as a legacy system. One way to assess the strength and security level of a system is through penetration testing and vulnerability assessment that would help in determining weaknesses, loopholes and potential breaches for exploitation in system defences. However, performing a real penetration test and vulnerability assessment in a real critical infrastructure system is infeasible and unlikely to happen because an unintended consequence that might occur can propagate its effect to a wider scale. On the other hand, a replicated system is also infeasible due to the high cost and huge effort required. Therefore, developing a realistic SCADA testbed is the best available option for the cyber-security exercise to take place. This paper describes in-detail a scalable and reconfigurable SCADA testbed for cyber-security analysis. © 2018 Penerbit Universiti All rights reserved. | en_US |
dc.language.iso | en | en_US |
dc.relation.ispartof | Proceedings of the 6th International Cryptology and Information Security Conference 2018, CRYPTOLOGY 2018 2018, Pages 176-188 | en_US |
dc.title | A practical SCADA testbed in electrical power system environment for cyber-security exercises | en_US |
dc.type | Article | en_US |
item.fulltext | No Fulltext | - |
item.grantfulltext | none | - |
Appears in Collections: | UNITEN Scholarly Publication |
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.