메뉴 건너뛰기




Volumn , Issue , 2011, Pages 1-341

Industrial network security: Securing critical infrastructure networks for smart grid, scada, and other industrial control systems

(1)  Knapp, Eric a  

a NONE

Author keywords

[No Author keywords available]

Indexed keywords

COMPLIANCE CONTROL; CRITICAL INFRASTRUCTURES; ELECTRIC POWER SYSTEM SECURITY; ELECTRIC POWER TRANSMISSION NETWORKS; NETWORK PROTOCOLS; PUBLIC WORKS; REGULATORY COMPLIANCE; RISK ASSESSMENT; SCADA SYSTEMS; SMART POWER GRIDS; TRANSMISSION CONTROL PROTOCOL;

EID: 84987813232     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1016/B978-1-59749-645-2.00024-0     Document Type: Book
Times cited : (90)

References (186)
  • 2
  • 3
    • 84987817074 scopus 로고    scopus 로고
    • Homeland security presidential directive/HSPD-7
    • September, cited: November 1, 2010
    • Department of Homeland Security, Homeland security presidential directive/HSPD-7. Roles and responsibilities of sector-specific federal agencies (18)(d). , September 2008 (cited: November 1, 2010).
    • (2008) Roles and responsibilities of sector-specific federal agencies , Issue.18 D
  • 4
    • 84987823953 scopus 로고    scopus 로고
    • SCADA and ICS for security experts: How to avoid cyberdouchery
    • July
    • J. Arlen, SCADA and ICS for security experts: how to avoid cyberdouchery. in: Proc. 2010 BlackHat Technical Conference, July 2010.
    • (2010) Proc. 2010 BlackHat Technical Conference
    • Arlen, J.1
  • 5
    • 84987790223 scopus 로고    scopus 로고
    • Special Publication 800-53 Revision 3
    • August, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, Gaithersburg, MD 20899-8930
    • National Institute of Standards and Technology, Special Publication 800-53 Revision 3. Recommended Security Controls for Federal Information Systems and Organizations, August 2009, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, Gaithersburg, MD 20899-8930.
    • (2009) Recommended Security Controls for Federal Information Systems and Organizations
  • 7
    • 24944551836 scopus 로고    scopus 로고
    • Special Publication 800-53 Revision 3, August, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, Gaithersburg, MD
    • National Institute of Standards and Technology, Special Publication 800-53 Revision 3. Recommended Security Controls for Federal Information Systems and Organizations, August 2009, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, Gaithersburg, MD.
    • (2009) Recommended Security Controls for Federal Information Systems and Organizations
  • 8
    • 84987786422 scopus 로고    scopus 로고
    • Department of Homeland Security, Office of Infrastructure Protection, Infrastructure Security Compliance Division, Washington, DC, May
    • Department of Homeland Security, Risk-based performance standards guidance; chemical facility anti-terrorism standards, Department of Homeland Security, Office of Infrastructure Protection, Infrastructure Security Compliance Division, Washington, DC, May 2009.
    • (2009) Risk-based performance standards guidance; chemical facility anti-terrorism standards
  • 10
    • 84987836307 scopus 로고    scopus 로고
    • Information Technology-Security Techniques-Code of Practice for Information Security Management, ISO/IEC, Geneva, Switzerland
    • International Standards Organization, ISO/IEC 27002:2005. Information Technology-Security Techniques-Code of Practice for Information Security Management, ISO/IEC, Geneva, Switzerland, 2005.
    • (2005) ISO/IEC 27002:2005
  • 11
    • 84987786427 scopus 로고    scopus 로고
    • Standard CIP-002-3, Cyber Security, Critical Cyber Asset Identification, North American Electric Corporation (NERC), Princeton, NJ, December 16
    • North American Electric Corporation, Standard CIP-002-3, Cyber Security, Critical Cyber Asset Identification, North American Electric Corporation (NERC), Princeton, NJ, December 16, 2009.
    • (2009)
  • 15
    • 84987839309 scopus 로고    scopus 로고
    • Red Tiger, Electricity for free? The dirty underbelly of SCADA and smart meters
    • Las Vegas, NV, July
    • J. Pollet, Red Tiger, Electricity for free? The dirty underbelly of SCADA and smart meters, in: Proc. 2010 BlackHat Technical Conference, Las Vegas, NV, July 2010.
    • (2010) Proc. 2010 BlackHat Technical Conference
    • Pollet, J.1
  • 17
    • 70449412262 scopus 로고    scopus 로고
    • Department of Electrical Engineering and Computer Sciences, University of California at Berkeley, and School of Electrical Engineering, Royal Institute of Technology (KTH), Berkeley, CA
    • A. Giani, S. Sastry, K.H. Johansson, H.Sandberg, The VIKING Project: An Initiative on Resilient Control of Power Networks, Department of Electrical Engineering and Computer Sciences, University of California at Berkeley, and School of Electrical Engineering, Royal Institute of Technology (KTH), Berkeley, CA, 2009.
    • (2009) The VIKING Project: An Initiative on Resilient Control of Power Networks
    • Giani, A.1    Sastry, S.2    Johansson, K.H.3    Sandberg, H.4
  • 18
    • 0347227352 scopus 로고    scopus 로고
    • Special Publication 800-82 (Final Public Draft), Guide to Industrial Control Systems (ICS) Security, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Gaithersburg, MD and Intelligent Systems Division, Manufacturing Engineering Laboratory, National Institute of Standards and Technology Gaithersburg, MD, September
    • K. Stouffer, J. Falco, K. Scarfone, National Institute of Standards and Technology, Special Publication 800-82 (Final Public Draft), Guide to Industrial Control Systems (ICS) Security, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Gaithersburg, MD and Intelligent Systems Division, Manufacturing Engineering Laboratory, National Institute of Standards and Technology Gaithersburg, MD, September 2008.
    • (2008) National Institute of Standards and Technology
    • Stouffer, K.1    Falco, J.2    Scarfone, K.3
  • 20
    • 84987810760 scopus 로고    scopus 로고
    • Sources: Staged cyber attack reveals vulnerability in power grid
    • J. Meserve, http://CNN.com. Sources: Staged cyber attack reveals vulnerability in power grid.
    • Meserve, J.1
  • 21
    • 84987784363 scopus 로고    scopus 로고
    • September 26, cited: November 3, 2010
    • , September 26, 2007 (cited: November 3, 2010).
    • (2007)
  • 22
    • 84987790459 scopus 로고    scopus 로고
    • Press Release: NERC Issues AURORA Alert to Industry, October 14
    • North American Reliability Corporation, Press Release: NERC Issues AURORA Alert to Industry, October 14, 2010.
    • (2010)
  • 23
    • 77956339583 scopus 로고    scopus 로고
    • November 8, cited: November 3, 2010
    • CBS News, Cyber war: sabotaging the system. , November 8, 2009 (cited: November 3, 2010).
    • (2009) Cyber war: Sabotaging the system
  • 24
    • 84861216201 scopus 로고    scopus 로고
    • cited: November 4
    • McAfee Threat Center, Operation Aurora. (cited: November 4, 2010).
    • (2010) Operation Aurora
  • 25
    • 84987798152 scopus 로고    scopus 로고
    • ICSA-10-238-01-STUXNET MALWARE MITIGATION, Department of Homeland Security, US-CERT, Washington, DC, August 26
    • Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), ICSA-10-238-01-STUXNET MALWARE MITIGATION, Department of Homeland Security, US-CERT, Washington, DC, August 26, 2010.
    • (2010)
  • 29
    • 80053008651 scopus 로고    scopus 로고
    • McAfee Foundstone Professional Services and McAfee Labs, Santa Clara, CA, February 10
    • Global Energy Cyberattacks: "Night Dragon," McAfee Foundstone Professional Services and McAfee Labs, Santa Clara, CA, February 10, 2011.
    • (2011) Night Dragon
  • 37
    • 79956041040 scopus 로고    scopus 로고
    • March, cited: November 4, 2010
    • D. Stevens, Escape from PDF. , March 2010 (cited: November 4, 2010).
    • (2010) Escape from PDF
    • Stevens, D.1
  • 38
    • 84987798087 scopus 로고    scopus 로고
    • M86 Security Labs, PDF "Launch" Feature Used to Install Zeus, April 14, cited: November 4, 2010
    • M86 Security Labs, PDF "Launch" Feature Used to Install Zeus. , April 14, 2010 (cited: November 4, 2010).
    • (2010)
  • 39
    • 84987849115 scopus 로고    scopus 로고
    • J. Conway, http://www.Sudosecure.net.
    • Conway, J.1
  • 40
    • 84987818215 scopus 로고    scopus 로고
    • Worm-Able PDF Clarification, April 4, cited: November 4, 2010
    • Worm-Able PDF Clarification. , April 4, 2010 (cited: November 4, 2010).
    • (2010)
  • 43
    • 84987848621 scopus 로고    scopus 로고
    • Twitter-based Botnet Command Channel, August 13, cited: November 4, 2010
    • J. Nazario, Arbor networks. Twitter-based Botnet Command Channel. , August 13, 2009 (cited: November 4, 2010).
    • (2009) Arbor networks
    • Nazario, J.1
  • 45
    • 84987841927 scopus 로고    scopus 로고
    • Italian researcher publishes 34 ICS vulnerabilities
    • March 21, cited: April 4, 2011
    • D. Peterson, Italian researcher publishes 34 ICS vulnerabilities. Digital Bond. , March 21, 2011 (cited: April 4, 2011).
    • (2011) Digital Bond
    • Peterson, D.1
  • 51
    • 84987836229 scopus 로고    scopus 로고
    • March, cited: November 24, 2010
    • The DNP Users Group, DNP3 Primer, Revision A. , March 2005 (cited: November 24, 2010).
    • (2005) DNP3 Primer, Revision A
  • 53
    • 84987836229 scopus 로고    scopus 로고
    • March, cited: November 24, 2010
    • The DNP Users Group, DNP3 Primer, Revision A. , March 2005 (cited: November 24, 2010).
    • (2005) DNP3 Primer, Revision A
  • 54
    • 84987798104 scopus 로고    scopus 로고
    • Digitalbond SCADAPEDIA, Secure DNP3, August, cited: November 24, 2010
    • Digitalbond SCADAPEDIA, Secure DNP3. , August 2008 (cited: November 24, 2010).
    • (2008)
  • 55
    • 84987836229 scopus 로고    scopus 로고
    • March, cited: November 24, 2010
    • The DNP Users Group, DNP3 Primer, Revision A. , March, 2005 (cited: November 24, 2010).
    • (2005) DNP3 Primer, Revision A
  • 58
    • 84987780471 scopus 로고    scopus 로고
    • OPC Security White Paper #2: OPC Exposed (Version 1-3c), Byres Research, Lantzville, BC and Sunrise, FL, November 13
    • Digital Bond, British Columbia Institute of Technology, and Byres Research. OPC Security White Paper #2: OPC Exposed (Version 1-3c), Byres Research, Lantzville, BC and Sunrise, FL, November 13, 2007.
    • (2007) Digital Bond, British Columbia Institute of Technology, and Byres Research
  • 59
    • 84987780480 scopus 로고    scopus 로고
    • cited: November 4
    • Microsoft Corporation, RPC Protocol Operation. (cited: November 4, 2010).
    • (2010) RPC Protocol Operation
  • 60
    • 84987808929 scopus 로고    scopus 로고
    • A Brief Introduction to OPC™ Data Access, November 11, cited: November 29, 2010
    • European Organization for Nuclear Research (CERN), A Brief Introduction to OPC™ Data Access. , November 11, 2000 (cited: November 29, 2010).
    • (2000)
  • 61
    • 84987780471 scopus 로고    scopus 로고
    • OPC Security White Paper #1 Understanding OPC and How It Is Deployed (Version 1-3b), Byres Research, Lantzville, BC and Sunrise, FL, July 27
    • Digital Bond, British Columbia Institute of Technology, and Byres Research, OPC Security White Paper #1 Understanding OPC and How It Is Deployed (Version 1-3b), Byres Research, Lantzville, BC and Sunrise, FL, July 27, 2007.
    • (2007) Digital Bond, British Columbia Institute of Technology, and Byres Research
  • 62
    • 84987780471 scopus 로고    scopus 로고
    • OPC Security White Paper #2: OPC Exposed (Version 1-3c), Byres Research, Lantzville, BC and Sunrise, FL, November 13
    • Digital Bond, British Columbia Institute of Technology, and Byres Research. OPC Security White Paper #2: OPC Exposed (Version 1-3c), Byres Research, Lantzville, BC and Sunrise, FL, November 13, 2007.
    • (2007) Digital Bond, British Columbia Institute of Technology, and Byres Research
  • 63
    • 84987829075 scopus 로고    scopus 로고
    • cited: November 24, 2010, Saarbrücken, Germany
    • ODVA, CIP Technology Overview. , 2010 (cited: November 24, 2010), Saarbrücken, Germany.
    • (2010) CIP Technology Overview
  • 66
    • 84863682817 scopus 로고    scopus 로고
    • Introduction to Real-Time Ethernet II
    • Contemporary Control Systems, Inc., Downers Grove, IL, July
    • P. Doyle, Introduction to Real-Time Ethernet II. The Extension: A Technical Supplement to Control Network, vol. 5, Issue 4, Contemporary Control Systems, Inc., Downers Grove, IL, July 2004.
    • (2004) The Extension: A Technical Supplement to Control Network , vol.5 , Issue.4
    • Doyle, P.1
  • 67
    • 84987782171 scopus 로고    scopus 로고
    • cited: November 24, 2010
    • Ethernet POWERLINK Standardization Group, CANopen. , 2009 (cited: November 24, 2010).
    • (2009) CANopen
  • 68
    • 84987782141 scopus 로고    scopus 로고
    • cited: November 24, 2010
    • SERCOS International, Technology: Introduction to SERCOS interface. , 2010 (cited: November 24, 2010).
    • (2010) Introduction to SERCOS interface
  • 69
    • 84987782165 scopus 로고    scopus 로고
    • cited: November 24, 2010
    • SERCOS International, Technology: Cyclic Operation. , 2010 (cited: November 24, 2010).
    • (2010) Cyclic Operation
  • 70
    • 84987782163 scopus 로고    scopus 로고
    • cited: November 24, 2010
    • SERCOS International, Technology: Service & IP Channels. , 2010 (cited: November 24, 2010).
    • (2010) Service & IP Channels
  • 74
    • 84987840834 scopus 로고    scopus 로고
    • Ladder logic
    • http://PLCTutor.com, Ladder logic.
  • 75
    • 84987840843 scopus 로고    scopus 로고
    • October 19, cited: November 29, 2010
    • , October 19, 2000 (cited: November 29, 2010).
    • (2000)
  • 79
    • 84987842941 scopus 로고    scopus 로고
    • October, 19, cited: November 29, 2010
    • , October, 19, 2000 (cited: November 29, 2010).
    • (2000)
  • 80
    • 84987783045 scopus 로고    scopus 로고
    • cited: November 29, 2010
    • OSIsoft, OSIsoft company overview. , 2010 (cited: November 29, 2010).
    • (2010) OSIsoft company overview
  • 81
    • 84987804613 scopus 로고    scopus 로고
    • Idaho National Laboratories, Control systems at risk: Sophisticated penetration testers show how to get through the defenses
    • October
    • J. Larson, Idaho National Laboratories, Control systems at risk: sophisticated penetration testers show how to get through the defenses, in: Proc. 2009 SANS European SCADA and Process Control Security Summit, October, 2009.
    • (2009) Proc. 2009 SANS European SCADA and Process Control Security Summit
    • Larson, J.1
  • 86
    • 78651572185 scopus 로고    scopus 로고
    • SANDIA Report SAND2007-7327, Sandia National Laboratories, Albuquerque, New Mexico and Livermore, California, November
    • Raymond C. Parks, SANDIA Report SAND2007-7327, Advanced Metering Infrastructure Security Considerations, Sandia National Laboratories, Albuquerque, New Mexico and Livermore, California, November 2007.
    • (2007) Advanced Metering Infrastructure Security Considerations
    • Parks, R.C.1
  • 88
    • 84987845399 scopus 로고    scopus 로고
    • cited: December 23, 2010
    • Computer Based Social Engineering Tools: Social Engineer Toolkit (SET). 2010 (cited: December 23, 2010).
    • (2010) Social Engineer Toolkit (SET)
  • 90
    • 84987776841 scopus 로고    scopus 로고
    • http://nmap.org.
  • 91
    • 84987776853 scopus 로고    scopus 로고
    • Introduction, cited: December 23, 2010
    • Introduction. , 2010 (cited: December 23, 2010).
    • (2010)
  • 92
    • 84987840996 scopus 로고    scopus 로고
    • http://nmap.org.
  • 93
    • 84987840992 scopus 로고    scopus 로고
    • Nmap Reference Guide, cited: December 23, 2010
    • Nmap Reference Guide. , 2010 (cited: December 23, 2010).
    • (2010)
  • 95
    • 84903581317 scopus 로고    scopus 로고
    • cited: December 23, 2010
    • Rapid7 LLC. The Metasploit framework. , 2010 (cited: December 23, 2010).
    • (2010) The Metasploit framework
  • 97
    • 84987788434 scopus 로고    scopus 로고
    • http://www.zdnet.com/blog/security/shodan-search-exposes-insecure-scada-systems/7611.
  • 99
    • 84987795081 scopus 로고    scopus 로고
    • October 18, cited December 23, 2010
    • M. Franz, DNP3 Recon, Digital bond. , October 18, 2006 (cited December 23, 2010).
    • (2006) DNP3 Recon, Digital bond
    • Franz, M.1
  • 101
    • 0347227352 scopus 로고    scopus 로고
    • Special Publication 800-82 (Final Public Draft), Guide to Industrial Control Systems (ICS) Security, Section 6.3.1 Identification and Authentication, September
    • K. Stouffer, J. Falco, K. Scarfone, National Institute of Standards and Technology, Special Publication 800-82 (Final Public Draft), Guide to Industrial Control Systems (ICS) Security, Section 6.3.1 Identification and Authentication, September, 2008.
    • (2008) National Institute of Standards and Technology
    • Stouffer, K.1    Falco, J.2    Scarfone, K.3
  • 103
    • 0347227352 scopus 로고    scopus 로고
    • Special Publication 800-82 (Final Public Draft), Guide to Industrial Control Systems (ICS) Security, September
    • K. Stouffer, J. Falco, K. Scarfone, National Institute of Standards and Technology. Special Publication 800-82 (Final Public Draft), Guide to Industrial Control Systems (ICS) Security, September 2008.
    • (2008) National Institute of Standards and Technology
    • Stouffer, K.1    Falco, J.2    Scarfone, K.3
  • 105
    • 84987839309 scopus 로고    scopus 로고
    • Electricity for free? The dirty underbelly of SCADA and Smart Meters. Red Tiger Security
    • July
    • J. Pollet, Electricity for free? The dirty underbelly of SCADA and Smart Meters. Red Tiger Security. in: Proc. 2010 BlackHat Technical Conference, July, 2010.
    • (2010) Proc. 2010 BlackHat Technical Conference
    • Pollet, J.1
  • 106
    • 84987791288 scopus 로고    scopus 로고
    • cited: December 23, 2010
    • United States Computer Emergency Readiness Team (US-CERT), Overview of cyber vulnerabilities. , 2010 (cited: December 23, 2010).
    • (2010) Overview of cyber vulnerabilities
  • 107
    • 84987791288 scopus 로고    scopus 로고
    • cited: December 23, 2010
    • United States Computer Emergency Readiness Team (US-CERT), Overview of cyber vulnerabilities. , 2010 (cited: December 23, 2010).
    • (2010) Overview of cyber vulnerabilities
  • 108
    • 84987842923 scopus 로고    scopus 로고
    • cited: December 23, 2010
    • http://Wi-Foo.com, Recon and attack tools. , 2006 (cited: December 23, 2010).
    • (2006) Recon and attack tools
  • 109
    • 84987804613 scopus 로고    scopus 로고
    • Idaho National Laboratories, Control systems at risk: Sophisticated penetration testers show how to get through the defenses
    • October
    • J. Larson, Idaho National Laboratories, Control systems at risk: sophisticated penetration testers show how to get through the defenses. in: Proc. 2009 SANS European SCADA and Process Control Security Summit, October, 2009.
    • (2009) Proc. 2009 SANS European SCADA and Process Control Security Summit
    • Larson, J.1
  • 110
    • 84987791278 scopus 로고    scopus 로고
    • S4 Briefings book (Wi-Fi jamming presentation)
    • S4 Briefings book (Wi-Fi jamming presentation).
  • 111
    • 84987791288 scopus 로고    scopus 로고
    • cited: December 23, 2010
    • United States Computer Emergency Readiness Team (US-CERT), Overview of cyber vulnerabilities. , 2010 (cited: December 23, 2010).
    • (2010) Overview of cyber vulnerabilities
  • 112
    • 0347227352 scopus 로고    scopus 로고
    • Special Publication 800-82 (Final Public Draft), Guide to Industrial Control Systems (ICS) Security, September
    • K. Stouffer, J. Falco, K. Scarfone, National Institute of Standards and Technology, Special Publication 800-82 (Final Public Draft), Guide to Industrial Control Systems (ICS) Security, September, 2008.
    • (2008) National Institute of Standards and Technology
    • Stouffer, K.1    Falco, J.2    Scarfone, K.3
  • 113
    • 84987783360 scopus 로고    scopus 로고
    • Rapid7, LLC, Press Release: Rapid7 acquires metasploit, October 21, cited: December 23, 2010
    • Rapid7, LLC, Press Release: Rapid7 acquires metasploit. , October 21, 2009 (cited: December 23, 2010).
    • (2009)
  • 114
    • 84987780628 scopus 로고    scopus 로고
    • Special Publication 800-40 Version 2, Creating a Patch and Vulnerability Management Program, National Institute of Standards and Technology (NIST), November
    • P. Mell, T. Bergeron, D. Henning, Special Publication 800-40 Version 2, Creating a Patch and Vulnerability Management Program, National Institute of Standards and Technology (NIST), November, 2005.
    • (2005)
    • Mell, P.1    Bergeron, T.2    Henning, D.3
  • 118
    • 84987816025 scopus 로고    scopus 로고
    • cited: December 23, 2010
    • Digital Bond SCADApedia, Bandolier and NERC CIP. , 2010 (cited: December 23, 2010).
    • (2010) Bandolier and NERC CIP
  • 119
    • 84987815685 scopus 로고    scopus 로고
    • cited: December 23, 2010
    • Digital Bond, Bandolier. , 2010 (cited: December 23, 2010).
    • (2010) Digital Bond, Bandolier
  • 121
    • 84987815692 scopus 로고    scopus 로고
    • Special Publication 800-40, Version 2, Creating a Patch and Vulnerability Management Program, National Institute of Standards and Technology (NIST), November
    • P. Mell, T. Bergeron, D. Henning, Special Publication 800-40, Version 2, Creating a Patch and Vulnerability Management Program, National Institute of Standards and Technology (NIST), November, 2005.
    • (2005)
    • Mell, P.1    Bergeron, T.2    Henning, D.3
  • 122
    • 0347227352 scopus 로고    scopus 로고
    • Special Publication 800-82 (Final Public Draft), Guide to Industrial Control Systems (ICS) Security, Section 6.3.1 Identification and Authentication, September
    • K. Stouffer, J. Falco, K. Scarfone, National Institute of Standards and Technology, Special Publication 800-82 (Final Public Draft), Guide to Industrial Control Systems (ICS) Security, Section 6.3.1 Identification and Authentication, September, 2008.
    • (2008) National Institute of Standards and Technology
    • Stouffer, K.1    Falco, J.2    Scarfone, K.3
  • 126
    • 84987843319 scopus 로고    scopus 로고
    • Standard CIP-002-3. Cyber Security-Critical Cyber Asset Identification, December 16, cited: January 19, 2011
    • North American Reliability Corporation, Standard CIP-002-3. Cyber Security-Critical Cyber Asset Identification. , December 16, 2009 (cited: January 19, 2011).
    • (2009)
  • 127
    • 84987804786 scopus 로고    scopus 로고
    • Standard CIP-005-3. Cyber Security-Electronic Security Perimeter(s), December 16, cited: January 19, 2011
    • North American Reliability Corporation, Standard CIP-005-3. Cyber Security-Electronic Security Perimeter(s). , December 16, 2009 (cited: January 19, 2011).
    • (2009)
  • 128
    • 84987795175 scopus 로고    scopus 로고
    • Standard CIP-003-3. Cyber Security-Security Management Controls, December 16, cited: January 19, 2011
    • North American Reliability Corporation, Standard CIP-003-3. Cyber Security-Security Management Controls. , December 16, 2009 (cited: January 19, 2011).
    • (2009)
  • 129
    • 84987804771 scopus 로고    scopus 로고
    • Standard CIP-005-3. Cyber Security-Electronic Security Perimeter(s), December 16, cited: January 19, 2011
    • North American Reliability Corporation, Standard CIP-005-3. Cyber Security-Electronic Security Perimeter(s). , December 16, 2009 (cited: January 19, 2011).
    • (2009)
  • 132
    • 84977181320 scopus 로고    scopus 로고
    • Standard CIP-008-3, December 16, cited: January 19, 2011
    • North American Reliability Corporation, Standard CIP-008-3. Cyber Security-Incident Reporting and Response Planning. , December 16, 2009 (cited: January 19, 2011).
    • (2009) Cyber Security-Incident Reporting and Response Planning
  • 134
    • 84929279500 scopus 로고    scopus 로고
    • Chemical Facility Anti-Terrorism Standards, May
    • Department of Homeland Security, Risk-Based Performance Standards Guidance, Chemical Facility Anti-Terrorism Standards, May, 2009.
    • (2009) Risk-Based Performance Standards Guidance
  • 137
    • 84987804817 scopus 로고    scopus 로고
    • SNORT Users Manual 2.9.0
    • http://www.Snort.org, SNORT Users Manual 2.9.0.
  • 138
    • 84987815658 scopus 로고    scopus 로고
    • December 2, cited: January 19, 2011
    • , December 2, 2010 (cited: January 19, 2011).
    • (2010)
  • 139
    • 84987841775 scopus 로고    scopus 로고
    • Network Threat and Analysis Center, January
    • NitroSecurity, Inc., Network Threat and Analysis Center, http://www.Nitrosecurity.com, January, 2011.
    • (2011)
  • 140
    • 0347227352 scopus 로고    scopus 로고
    • Special Publication 800-82 (Final Public Draft), Guide to Industrial Control Systems (ICS) Security, Section 6.3.1 Identification and Authentication, September
    • K. Stouffer, J. Falco, K. Scarfone, National Institute of Standards and Technology, Special Publication 800-82 (Final Public Draft), Guide to Industrial Control Systems (ICS) Security, Section 6.3.1 Identification and Authentication, September, 2008.
    • (2008) National Institute of Standards and Technology
    • Stouffer, K.1    Falco, J.2    Scarfone, K.3
  • 142
    • 84987819445 scopus 로고    scopus 로고
    • Correlating Risk Events and Process Trends
    • Kenexis Security Corporation and Digital Bond Press, Sunrise, FL
    • B. Singer, Correlating Risk Events and Process Trends. Proceedings of the SCADA Security Scientific Symposium (S4). Kenexis Security Corporation and Digital Bond Press, Sunrise, FL, 2010.
    • (2010) Proceedings of the SCADA Security Scientific Symposium (S4)
    • Singer, B.1
  • 144
    • 84987828944 scopus 로고    scopus 로고
    • July 28, cited: February 13, 2011
    • , July 28, 2003 (cited: February 13, 2011).
    • (2003)
  • 146
    • 84987811916 scopus 로고    scopus 로고
    • May 27, cited: February 13, 2011
    • The MITRE Corporation, About CEE (common event expression). , May 27, 2010 (cited: February 13, 2011).
    • (2010) About CEE (common event expression)
  • 148
    • 84987811916 scopus 로고    scopus 로고
    • May 27, cited: February 13, 2011
    • The MITRE Corporation, About CEE (common event expression). , May 27, 2010 (cited: February 13, 2011).
    • (2010) About CEE (common event expression)
  • 149
    • 84987811903 scopus 로고    scopus 로고
    • February, cited: January 19, 2011
    • A. Chuvakin, Content aware SIEM. , February 2000 (cited: January 19, 2011).
    • (2000) Content aware SIEM
    • Chuvakin, A.1
  • 150
    • 84987819445 scopus 로고    scopus 로고
    • Correlating risk events and process trends
    • Kenexis Security Corporation and Digital Bond Press, Sunrise, FL
    • B. Singer, Correlating risk events and process trends. Proceedings of the SCADA Security Scientific Symposium (S4). Kenexis Security Corporation and Digital Bond Press, 2010, Sunrise, FL.
    • (2010) Proceedings of the SCADA Security Scientific Symposium (S4)
    • Singer, B.1
  • 152
    • 84987811899 scopus 로고    scopus 로고
    • January 6, cited: March 3, 2011
    • Microsoft. Windows Management Instrumentation. , January 6, 2011 (cited: March 3, 2011).
    • (2011) Windows Management Instrumentation
  • 153
    • 84987828890 scopus 로고    scopus 로고
    • Special Publication 800-53 Revision 3. Recommended Security Controls for Federal Information Systems and Organizations, August
    • National Institute of Standards and Technology, Special Publication 800-53 Revision 3. Recommended Security Controls for Federal Information Systems and Organizations, August, 2009.
    • (2009)
  • 154
    • 84987791395 scopus 로고    scopus 로고
    • http://sFlow.org.
  • 158
    • 84987811903 scopus 로고    scopus 로고
    • February, cited: January 19, 2011
    • A. Chuvakin, Content Aware SIEM. February, 2000 (cited: January 19, 2011).
    • (2000) Content Aware SIEM
    • Chuvakin, A.1
  • 161
    • 84987828985 scopus 로고    scopus 로고
    • February 3, cited: March 3, 2011
    • North American Electric Reliability Corporation. NERC CIP Reliability Standards, version 4. February 3, 2011 (cited: March 3, 2011).
    • (2011) NERC CIP Reliability Standards, version 4
  • 163
    • 84987832604 scopus 로고    scopus 로고
    • Standard CIP-001-4-Sabotage Reporting, February 3, cited: March 3, 2011
    • North American Reliability Corporation, Standard CIP-001-4-Sabotage Reporting. , February 3, 2011 (cited: March 3, 2011).
    • (2011)
  • 164
    • 84987843157 scopus 로고    scopus 로고
    • Standard CIP-002-4-Cyber Security-Critical Cyber Asset Identification, February 3, cited: March 3, 2011
    • North American Reliability Corporation, Standard CIP-002-4-Cyber Security-Critical Cyber Asset Identification. , February 3, 2011 (cited: March 3, 2011).
    • (2011)
  • 165
    • 84987812926 scopus 로고    scopus 로고
    • Standard CIP-003-4-Cyber Security-Security Management Controls, February 3, cited: March 3, 2011
    • North American Reliability Corporation, Standard CIP-003-4-Cyber Security-Security Management Controls. , February 3, 2011 (cited: March 3, 2011).
    • (2011)
  • 166
    • 84987845475 scopus 로고    scopus 로고
    • Standard CIP-004-4-Cyber Security-Personnel and Training, February 3, cited: March 3, 2011
    • North American Reliability Corporation, Standard CIP-004-4-Cyber Security-Personnel and Training. , February 3, 2011 (cited: March 3, 2011).
    • (2011)
  • 167
    • 84987812920 scopus 로고    scopus 로고
    • Standard CIP-005-4-Cyber Security-Electronic Security Perimeter(s), February 3, cited: March 3, 2011
    • North American Reliability Corporation, Standard CIP-005-4-Cyber Security-Electronic Security Perimeter(s). , February 3, 2011 (cited: March 3, 2011).
    • (2011)
  • 168
    • 84987812933 scopus 로고    scopus 로고
    • Standard CIP-006-4-Cyber Security-Physical Security of Critical Cyber Assets, February 3, cited: March 3, 2011
    • North American Reliability Corporation, Standard CIP-006-4-Cyber Security-Physical Security of Critical Cyber Assets. , February 3, 2011 (cited: March 3, 2011).
    • (2011)
  • 169
    • 84987812903 scopus 로고    scopus 로고
    • Standard CIP-007-4-Cyber Security-Systems Security Management, February 3, cited: March 3, 2011
    • North American Reliability Corporation, Standard CIP-007-4-Cyber Security-Systems Security Management. , February 3, 2011 (cited: March 3, 2011).
    • (2011)
  • 170
    • 84987828877 scopus 로고    scopus 로고
    • Standard CIP-008-4-Cyber Security-Incident Reporting and Response Planning, February 3, cited: March 3, 2011
    • North American Reliability Corporation, Standard CIP-008-4-Cyber Security-Incident Reporting and Response Planning. , February 3, 2011 (cited: March 3, 2011).
    • (2011)
  • 171
    • 84987828884 scopus 로고    scopus 로고
    • Standard CIP-001-9-Cyber Security-Recovery Plans for Critical Cyber Assets, February 3, cited: March 3, 2011
    • North American Reliability Corporation, Standard CIP-001-9-Cyber Security-Recovery Plans for Critical Cyber Assets. , February 3, 2011 (cited: March 3, 2011).
    • (2011)
  • 173
    • 84878870876 scopus 로고    scopus 로고
    • cited: March 21
    • International Standards Organization/International Electrotechnical Commission (ISO/IEC), About ISO. http://www.iso.org/iso/about.htm (cited: March 21, 2011).
    • (2011) About ISO
  • 174
    • 84987849357 scopus 로고    scopus 로고
    • International ISO/IEC Standard 27002:2005 (E), Information Technology-Security Techniques-Code of Practice for Information Security Management, first edition 2005-06-15
    • International Standards Organization/International Electrotechnical Commission (ISO/IEC), International ISO/IEC Standard 27002:2005 (E), Information Technology-Security Techniques-Code of Practice for Information Security Management, first edition 2005-06-15.
  • 176
    • 0347227352 scopus 로고    scopus 로고
    • Special Publication 800-82 (Final Public Draft), Guide to Industrial Control Systems (ICS) Security, September
    • K. Stouffer, J. Falco, K. Scarfone, National Institute of Standards and Technology, Special Publication 800-82 (Final Public Draft), Guide to Industrial Control Systems (ICS) Security, September 2008.
    • (2008) National Institute of Standards and Technology
    • Stouffer, K.1    Falco, J.2    Scarfone, K.3
  • 177
    • 84987811041 scopus 로고    scopus 로고
    • cited: March 21
    • The Unified Compliance Framework, What is the UCF? (cited: March 21, 2011).
    • (2011) What is the UCF?
  • 180
    • 77950473836 scopus 로고    scopus 로고
    • Information Technology Laboratory, Federal Information Processing Standards Publication 140-2, May 25
    • National Institute of Standards and Technology, Information Technology Laboratory, Federal Information Processing Standards Publication 140-2, Security Requirements for Cryptographic Modules, May 25, 2001.
    • (2001) Security Requirements for Cryptographic Modules
  • 181
    • 84987804613 scopus 로고    scopus 로고
    • Idaho National Laboratories, Control systems at risk: Sophisticated penetration testers show how to get through the defenses
    • October
    • J. Larson, Idaho National Laboratories, Control systems at risk: sophisticated penetration testers show how to get through the defenses, in: Proc. 2009 SANS European SCADA and Process Control Security Summit, October, 2009.
    • (2009) Proc. 2009 SANS European SCADA and Process Control Security Summit
    • Larson, J.1
  • 183
    • 84987839309 scopus 로고    scopus 로고
    • Electricity for free? The dirty underbelly of SCADA and Smart Meters
    • July
    • J. Pollet, R. Tiger, Electricity for free? The dirty underbelly of SCADA and Smart Meters, in: Proc. 2010 BlackHat Technical Conference, July, 2010.
    • (2010) Proc. 2010 BlackHat Technical Conference
    • Pollet, J.1    Tiger, R.2
  • 184
    • 84987782909 scopus 로고    scopus 로고
    • October 4, cited: March 15, 2011
    • C. Sullo, http://CIRT.net. Default passwords. , October 4, 2007 (cited: March 15, 2011).
    • (2007) Default passwords
    • Sullo, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.