Reference Hub3
Challenges in Securing Industrial Control Systems Using Future Internet Technologies

Challenges in Securing Industrial Control Systems Using Future Internet Technologies

Mirjana D. Stojanović, Slavica V. Boštjančič Rakas
ISBN13: 9781799829102|ISBN10: 1799829103|ISBN13 Softcover: 9781799829119|EISBN13: 9781799829126
DOI: 10.4018/978-1-7998-2910-2.ch001
Cite Chapter Cite Chapter

MLA

Stojanović, Mirjana D., and Slavica V. Boštjančič Rakas. "Challenges in Securing Industrial Control Systems Using Future Internet Technologies." Cyber Security of Industrial Control Systems in the Future Internet Environment, edited by Mirjana D. Stojanović and Slavica V. Boštjančič Rakas, IGI Global, 2020, pp. 1-26. https://doi.org/10.4018/978-1-7998-2910-2.ch001

APA

Stojanović, M. D. & Boštjančič Rakas, S. V. (2020). Challenges in Securing Industrial Control Systems Using Future Internet Technologies. In M. Stojanović & S. Boštjančič Rakas (Eds.), Cyber Security of Industrial Control Systems in the Future Internet Environment (pp. 1-26). IGI Global. https://doi.org/10.4018/978-1-7998-2910-2.ch001

Chicago

Stojanović, Mirjana D., and Slavica V. Boštjančič Rakas. "Challenges in Securing Industrial Control Systems Using Future Internet Technologies." In Cyber Security of Industrial Control Systems in the Future Internet Environment, edited by Mirjana D. Stojanović and Slavica V. Boštjančič Rakas, 1-26. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-7998-2910-2.ch001

Export Reference

Mendeley
Favorite

Abstract

This chapter explores challenges in securing industrial control systems (ICS) and Supervisory Control And Data Acquisition (SCADA) systems using Future Internet technologies. These technologies include cloud computing, fog computing, Industrial internet of things (IIoT), etc. The need to design specific security solutions for ICS/SCADA networks is explained. A brief overview of cyber vulnerabilities and threats in industrial control networks, cloud, and IoT environments is presented. The security of cloud-based SCADA systems is considered, including benefits and risks of SCADA migration to the cloud, challenges in securing such systems, and migration toward fog computing. Challenges in securing IIoT are addressed, including security risks and operational issues, key principles for securing IIoT, the functional security architecture, and the role of fog computing. Authors point out current standardization activities and trends in the area, and emphasize conclusions and future research directions.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.