Review of SCADA systems and IoT honeypots
Internet of Things (IoT) is a massive technology that is being improved day by day. It connects different types of devices to the internet so that they can interchange data. The most feild that has been improved by implementing IoT’s technology is Supervisory Control and Data Acquisition (SCADA...
Saved in:
Main Authors: | , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English English |
Published: |
IEEE
2020
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/80899/7/80899%20Review%20of%20SCADA%20Systems%20and%20IoT%20Honeypots.pdf http://irep.iium.edu.my/80899/13/80899_Review%20of%20SCADA%20Systems%20and%20IoT%20Honeypots_scopus.pdf http://irep.iium.edu.my/80899/ https://ieeexplore.ieee.org/abstract/document/9117330 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Internet of Things (IoT) is a massive technology
that is being improved day by day. It connects different types
of devices to the internet so that they can interchange data. The
most feild that has been improved by implementing IoT’s
technology is Supervisory Control and Data Acquisition
(SCADA) Systems, or Industrial Control Systems (ICS). The
application of these systems is to be used in controlling
different elements that is connected to it (sensors, devices, and
machines). However, connecting different types of devices of
different physical circuitry and different communication
technology, together raises various security issues that has been
a place of concern for years. A famous technique that has been
implemented in the field of security to further study Cyber
Attacks, its causes, and effects is Honeypots. The Aim from this
paper is to categorize Cyber -physical attacks and their effects,
study SCADA/ICS systems’ architecture, highlight its security
weaknesses, and how Cyber/Physical attacks make use of these
weaknesses. Finally, a break down Honeypots and understand
its implementation and effectiveness in the Field of Cyber
Security. |
---|