Managing Mobile Device Security in Critical Infrastructure Sectors

作者: Chalee Vorakulpipat , Chantri Polprasert , Siwaruk Siwamogsatham

DOI: 10.1145/2659651.2659742

关键词:

摘要: Information security in critical infrastructure sectors has become a crucial issue recent years. A drastic increase of mobile device usage for accessing to corporate networks could expose the systems major risks. The paper provides an overview research and practice trends focusing on infrastructure. This includes access control, next-generation firewall, BYOD control mechanism, management policy. Confidentiality, integrity, availability issues related are discussed, followed by conclusion.

参考文章(13)
Bruno Dutertre, Steven Cheung, Martin Fong, Alfonso Valdes, Ulf Lindqvist, Keith Skinner, Using Model-based Intrusion Detection for SCADA Networks ,(2006)
Jingcheng Gao, Jing Liu, Bharat Rajan, Rahul Nori, Bo Fu, Yang Xiao, Wei Liang, C. L. Philip Chen, SCADA communication and security issues Security and Communication Networks. ,vol. 7, pp. 175- 194 ,(2014) , 10.1002/SEC.698
C.L. Bowen, T.K. Buennemeyer, R.W. Thomas, Next generation SCADA security: best practices and client puzzles systems man and cybernetics. pp. 426- 427 ,(2005) , 10.1109/IAW.2005.1495984
Peeyush Jain, Paritosh Tripathi, None, SCADA security: a review and enhancement for DNP3 based systems CSI Transactions on ICT. ,vol. 1, pp. 301- 308 ,(2013) , 10.1007/S40012-013-0024-2
Dong-Ho Kang, Byoung-Koo Kim, Jung-Chan Na, Cyber threats and defence approaches in SCADA systems international conference on advanced communication technology. pp. 324- 327 ,(2014) , 10.1109/ICACT.2014.6778974
C. M. Davis, J. E. Tate, H. Okhravi, C. Grier, T. J. Overbye, D. Nicol, SCADA Cyber Security Testbed Development north american power symposium. pp. 483- 488 ,(2006) , 10.1109/NAPS.2006.359615
M.A. McQueen, W.F. Boyer, M.A. Flynn, G.A. Beitel, Quantitative Cyber Risk Reduction Estimation Methodology for a Small SCADA Control System hawaii international conference on system sciences. ,vol. 9, pp. 226- 226 ,(2006) , 10.1109/HICSS.2006.405
Göran N. Ericsson, Cyber Security and Power System Communication—Essential Parts of a Smart Grid Infrastructure IEEE Transactions on Power Delivery. ,vol. 25, pp. 1501- 1507 ,(2010) , 10.1109/TPWRD.2010.2046654
Esteban Egea-Lopez, Alejandro Martinez-Sala, Javier Vales-Alonso, Joan Garcia-Haro, Josemaria Malgosa-Sanahuja, Wireless communications deployment in industry: a review of issues, options and technologies Computers in Industry. ,vol. 56, pp. 29- 53 ,(2005) , 10.1016/J.COMPIND.2004.10.001
Luca Verderame, Alessio Merlo, Gabriele Costa, Alessandro Armando, Securing the ``Bring Your Own Device'' Policy Journal of Internet Services and Information Security (JISIS). ,vol. 2, pp. 3- 17 ,(2012)