TABLE OF CONTENTS • ABSTRACT * CHAPTER 1 INTRODUCTION * • 1.1 Cyber Attacks * 1.2 Stakeholders * 1.3 Statement of Need * 1.4 Thesis Tasks * 1.5 Thesis Overview * CHAPTER 2 SUPERVISORY CONTROL AND DATA ACQUISITION * • 2.1 Introduction * 2.2 Master Terminal Unit * 2.3 Remote Terminal
References: Applegate, Lynda, M. Corporate Information System Management: Text and Cases, Fourth Edition, Irwin, Inc. Boston, MA. 1996. Amoroso, Edward, Fundamentals of Computer Security Technology, Prentice-Hall PTR, Uppersaddle River, NJ, 1994. Behar, Richard, "Who’s Reading Your Email?" Fortune Text Edition, February 3, 1997, http://www.pathfinder.com/@@uxdr5ayaeny7duax/fortune/1997/97020 (July 1, 1997). Brown, Eryn, "The Myth of Email Privacy", Fortune Text Edition, February 3, 1997, http://www.pathfinder.com/ @@uxdr5ayaeny7duax/fortune/1997/97020 (July 1, 1997). Duganm Joanne, Bechta and Trivedi, Kisitur, S., "Coverage Modeling for Dependability Analysis of Fault-Tolerant Systems", IEEE Transactions on Computers, Vol. 38, No. 6, 1989. Elgamal, Taher, "Securing Communications on the Intranet and Over the Internet", Netscape Communication Corporation, http://home.netscape.com/newsref/ref/128bit.html (June 30, 1997). Haimes, Yacov, Y., Risk Modeling, Assessment, and Management, John Wiley and Sons, Inc., New York, 1998. Hillebrand, Cary, Expert Three, Technical expert specializing in the planning and design of SCADA based and distributed control systems for regional and municipal water distribution networks and water/waste water treatment plants, 1997. Internet Security Solutions, "The Right Answer-Adaptive Security", ISS White Papers, http://www.iss.net (October 5, 1997). Kyas, Othmar, Internet Security: Risk Analysis Strategies and Firewalls, International Thompson Publishing, 1997. Lambert, Robert, "An Interview in Newport News, Va.", President, Automation, Inc., June 12, 1997. (October 10, 1997). Nelson, Anthony, Expert One, Technical expert for computer fraud tracing and intrusion testing for internet firewalls and mission critical applications like SCADA, 1997. Nelson, Anthony, Expert One, Personal email on scenario and estimates, 1998. President’s Commission on Critical Infrastructure Protection (PCCIP), http://www.pccip.gov/summary.html (October 23, 1997).