Developing Cyber Forensics for SCADA Industrial Control Systems
Proceeding: The International Conference on Information Security and Cyber Forensics (InfoSec)Publication Date: 2014-10-08
Authors : Joe Stirland; Kevin Jones; Helge Janicke; Tina Wu;
Page : 98-111
Keywords : SCADA; ICS; Cyber Forensics; Cyber Security;
Abstract
A large number of industries including: critical national infrastructure (electricity, gas, water, etc.) and manufacturing firms rely heavily on computer systems, networks, control systems, and embedded devices in order to provide safe and reliable operations. These networks can be very complex and are often bespoke to the types of product the industries may provide. In recent years we have seen a significant rise in malicious attacks against such systems, ranging from sophisticated intelligent attacks to simple tool based delivery mechanisms. With the rise in the reliance on industrial control networks and of course the increasing attacks, the lack of security monitoring and post forensic analysis of SCADA networks is becoming increasingly apparent. SCADA systems forensics is not like standard enterprise file-system forensics, the forensic specialist often has to be an expert in such systems/networks and SCADA related devices in order to identify where potential Forensic evidence could be located. This paper looks at the SCADA/industrial control systems, typical attacks and vulnerabilities, problems with forensic analysis and the development of a forensic methodology/toolkit for such systems.
Other Latest Articles
- A Second Look at the Information Security Awareness among Secondary School Students
- User Centric Trusted Log Archival Architecture in Cloud Computing Environments
- Opening the "Private Browsing" Data - Acquiring Evidence of Browsing Activities
- Cyber Defamation: A Comparative Analysis of the Legal Position in Malaysia and the United Kingdom
- Extension and Evaluation of Guideline Total Support System for Digital Forensics
Last modified: 2014-10-08 00:37:08