Winter2013 – Section 1
Control systems Security
Submitted by: Name | ID | Saleh F.Saleh
Srmed kashmoula | 201030027
20101119 |
Instructor:
Dr. Suhir Al Alamy
Due Date:
Thursday, June 9 , 2013
Table of Contents:
Abstract: 3
Introduction: 4
Security of control systems and new vulnerabilities: 5
Consequences of an Attack: 6
Efforts in control systems security: 6
Control system versus IT systems security: 6
Mathematical representation: 7
System Requirements and Attack Models: 7
Example 1: 9
Example 2: 9
Conclusion: 10
References: 11
Abstract
This research discusses the possibility of a control system of being attacked by different types of attacks and via different sources. The main questions are, what is the reason that would make the security of control system a very important and interesting topic? Why this problem should be subjected to studying and analyzing? What are the needed requirements for the security of a control system? Fundamental and new requirements are provided in this search. Additionally, new mathematical frameworks are proposed to analyze those attacks. This framework, the way to detect an attack and how to survive it has been out together in this paper (Alvaro A. C´ardenas, 2008).
Introduction Control system is the best way to control the behavior of a machine or a mechanism to get desired output that satisfies the customer needs and specifications. However, there certain problems might accrue, control systems can be subjected to different types of attacks and those attacks might cause also physical damage (Alvaro A. C´ardenas, 2008). The use of control systems is to control machines, or any mechanical system one might say, to get output that would satisfy the need, control system also observe the physical processes and act accordingly as control systems are computer-based systems. Each control systems has a specific function depending on
References: * Alvaro A. C´ardenas, S. S. (2008). Research Challenges for the Security of Control Systems. * ISA-SP99, Manufacturing and Control Systems Security. (2004). Retrieved 2013, from www.isa.org: http://www.isa.org/MSTemplate.cfm?Section=Home964&Site=SP99,_Manufacturing_and_Control_Systems_Security1&Template=/ContentManagement/MSContentDisplay.cfm&ContentID=62592 * NIST Seeks Comments on Security Control. (2011). Retrieved 2013, from www.nist.gov: http://www.nist.gov/itl/csd/20110301_80053_rev_rfc.cfm