Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Entire DC Network
The Not So Smart, Smart Grid: Potential Security Risks Associated With Thedeployment Of Smart Grid Technologies, Craig Valli
The Not So Smart, Smart Grid: Potential Security Risks Associated With Thedeployment Of Smart Grid Technologies, Craig Valli
Australian Digital Forensics Conference
The electricity grid has been up until now a relatively stable artifice of modern industrialized nations. The power grids are the most widespread wired networks in the world. They are heavily regulated and standardized to protect the integrity, stability and reliability of supply. The grids have been essentially closed systems, this is now rapidly changing with the introduction of the network enabled smart meter. These meters are “web” accessible, connect and interact directly with electrical appliances in domiciles and businesses. This move now brings a range of extreme risks and complexities into these stable networks. This paper explores the security …
Scada Security - Slowly Circling A Disaster Area, Craig Valli, Andrew Woodward
Scada Security - Slowly Circling A Disaster Area, Craig Valli, Andrew Woodward
Research outputs pre 2011
SCADA (Supervisory Control And Data Acquisition) networks control much of the industrialised nations production and supply complexes. Various government reports and investigations have highlighted the vulnerability of these systems. Many of these systems are on private networks which are increasingly being connected to systems that are accessible from other networks such as the Internet. SCADA systems have unique security and operational requirements. However, many of the most basic security measures are missing in these networks. This examines some of these issues and proposes some technologies that could help secure these networks from attack.
Scada Forensics With Snort Ids, Craig Valli
Scada Forensics With Snort Ids, Craig Valli
Research outputs pre 2011
This paper is a research in progress paper outlining an approach using open source IDS (Snort) and honeypot (nepenthes, honeyd) technologies to create a resilient layered defensive approach for SCADA and control systems networks.