Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 1 of 1
Full-Text Articles in Computer Engineering
Safeguarding Australia From Cyber-Terrorism:A Proposed Cyber-Terrorism Scada Risk Framework For Industry Adoption, Christopher Beggs, Matthew Warren
Safeguarding Australia From Cyber-Terrorism:A Proposed Cyber-Terrorism Scada Risk Framework For Industry Adoption, Christopher Beggs, Matthew Warren
Australian Information Warfare and Security Conference
Terrorist groups are currently using information and communication technologies (ICTs) to orchestrate their conventional physical attacks. More recently, terrorists have been developing a new form of capability within the cyber-arena to coordinate cyber-based attacks. This paper identifies that cyber-terrorism capabilities are an integral, imperative, yet under-researched component in establishing, and enhancing cyber-terrorism risk assessment models for SCADA systems. This paper is an extension of work previously published by Beggs and Warren 2008, it presents a high level overview of a cyber-terrorism SCADA risk framework that has been adopted and validated by SCADA industry practitioners. The paper proposes a managerial framework …