Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

Edith Cowan University

Australian Information Warfare and Security Conference

2008

Vulnerability

Articles 1 - 2 of 2

Full-Text Articles in Entire DC Network

Protecting Critical Infrastructure With Games Technology, Adrian Boeing, Martin Masek, Bill Bailey Dec 2008

Protecting Critical Infrastructure With Games Technology, Adrian Boeing, Martin Masek, Bill Bailey

Australian Information Warfare and Security Conference

It is widely recognised that there is a considerable gap in the protection of the national infrastructure. Trying to identify what is in fact ‘critical’ is proving to be very difficult as threats constantly evolve. An interactive prototyping tool is useful in playing out scenarios and simulating the effect of change, however existing simulators in the critical infrastructure area are typically limited in the visual representation and interactivity. To remedy this we propose the use of games technology. Through its use, critical infrastructure scenarios can be rapidly constructed, tested, and refined. In this paper, we highlight the features of games …


A Holistic Scada Security Standard For The Australian Context, Christopher Beggs Dec 2008

A Holistic Scada Security Standard For The Australian Context, Christopher Beggs

Australian Information Warfare and Security Conference

Supervisory Control and Data Acquisition (SCADA) systems which control Australia’s critical infrastructure are currently demonstrating signs of vulnerabilities as they are being interconnected to corporate networks, essentially exposing them to malicious threats. This paper discusses the vulnerabilities associated with SCADA systems, as well as discussing various SCADA standards and initiatives that have been developed in recent years to mitigate such threats. The paper presents the requirement for a holistic SCADA security standard that is practical and feasible for each SCADA industry sector.