Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

Edith Cowan University

2009

SCADA

Articles 1 - 3 of 3

Full-Text Articles in Entire DC Network

The Not So Smart, Smart Grid: Potential Security Risks Associated With Thedeployment Of Smart Grid Technologies, Craig Valli Mar 2009

The Not So Smart, Smart Grid: Potential Security Risks Associated With Thedeployment Of Smart Grid Technologies, Craig Valli

Australian Digital Forensics Conference

The electricity grid has been up until now a relatively stable artifice of modern industrialized nations. The power grids are the most widespread wired networks in the world. They are heavily regulated and standardized to protect the integrity, stability and reliability of supply. The grids have been essentially closed systems, this is now rapidly changing with the introduction of the network enabled smart meter. These meters are “web” accessible, connect and interact directly with electrical appliances in domiciles and businesses. This move now brings a range of extreme risks and complexities into these stable networks. This paper explores the security …


Scada Security - Slowly Circling A Disaster Area, Craig Valli, Andrew Woodward Jan 2009

Scada Security - Slowly Circling A Disaster Area, Craig Valli, Andrew Woodward

Research outputs pre 2011

SCADA (Supervisory Control And Data Acquisition) networks control much of the industrialised nations production and supply complexes. Various government reports and investigations have highlighted the vulnerability of these systems. Many of these systems are on private networks which are increasingly being connected to systems that are accessible from other networks such as the Internet. SCADA systems have unique security and operational requirements. However, many of the most basic security measures are missing in these networks. This examines some of these issues and proposes some technologies that could help secure these networks from attack.


Scada Forensics With Snort Ids, Craig Valli Jan 2009

Scada Forensics With Snort Ids, Craig Valli

Research outputs pre 2011

This paper is a research in progress paper outlining an approach using open source IDS (Snort) and honeypot (nepenthes, honeyd) technologies to create a resilient layered defensive approach for SCADA and control systems networks.