Conventional IT Security and Relevant SCADA Issues
Over the years, information system security professionals developed a number of generally accepted best practies to protect networks and computing infrastructures from malicious attacks. However, these practices cannot be applied directly to SCADA systems without accounting for the different requirements of IT and SCADA systems. The following list provides examples of IT best practices and the state of their application to SCADA systems: - Audit and monitoring logs: After-the-fact analysis of audit trails is a useful means to detect past events. Monitoring, on the other hand, implies real-time capture of data as a system is operating Both techniques are successfully employed in IT systems.Their application to SCADA systems will yield benefits similar to those derived from their use in IT systems. BEcause of the varying ages and sophistication of some SCADA system components, many do not have logging capabilities. The cost of installing, operating, and maintaining extensive auditing a...