Mapping Water Sector Cyber-Security Vulnerabilities
Download
Author
James H. Graham, Jeffrey L. Hieb and J. Chris Foreman
Tech report number
CERIAS TR 2012-15
Entry type
conference
Abstract
This paper identifies, characterizes, maps, and prioritizes cyber-vulnerabilities in the industrial control systems which are used throughout the Water Sector (includes both drinking water and wastewater treatment facilities). This report discusses both technical vulnerabilities and business/operational challenges, with concentration on the technical issues. The priority order is based upon the research team’s review of the “Road Map to Secure Control Systems in the Water Sector,” DHS Control Systems Security Program documents, a CSET-CS2SAT evaluation, and from comments by the project advisory board and individual discussion with water sector personnel.
Download
Date
2012 – 1 – 1
Editor
Aljahdali, S.
Journal
24th International Conference on Computers and Their Applications in Industry and Engineering 2011 (CAINE-2011)
Key alpha
Foreman
Pages
298--304
Publisher
Curran Associates, Inc.
Publication Date
2012-01-01
Isbn
9781618393227
Keywords
critical infrastructure, water, cyber security

