Security

Protecting Critical Infrastructure SCADA Network Security Monitoring

Download Now Free registration required

Executive Summary

SCADA systems are used for many different types of processes which require monitoring, reporting or control from a computer system. SCADA devices are managed and report information to control centers through a variety of protocols including DNP3, ICCP and MODBUS protocols. SCADA systems are used for control of systems requiring both human and automated interaction. Since SCADA networks control very critical processes, any discussion of hackers taking them over or a worm causing an outage quickly escalate into "Hollywood" or "worse-case" scenario.

  • Format: PDF
  • Size: 137.3 KB