You are not logged in.

Cyber security and protection of ICS systems: An australian example

Warren, Matthew J. and Leitch, Shona 2015, Cyber security and protection of ICS systems: An australian example. In Lehto, Martti and Neittaanmäki, Pekka (ed), Cyber security : analytics, technology and automation, Springer, Berlin, Germany, pp.215-228, doi: 10.1007/978-3-319-18302-2_14.

Attached Files
Name Description MIMEType Size Downloads

Title Cyber security and protection of ICS systems: An australian example
Author(s) Warren, Matthew J.
Leitch, Shona
Title of book Cyber security : analytics, technology and automation
Editor(s) Lehto, Martti
Neittaanmäki, Pekka
Publication date 2015
Series Intelligent systems, control and automation : science and engineering; v.78
Chapter number 14
Total chapters 16
Start page 215
End page 228
Total pages 14
Publisher Springer
Place of Publication Berlin, Germany
Summary Many aspects of our modern society now have either a direct or implicit dependence upon information technology. As such, a compromise of the availability or integrity in relation to these systems (which may encompass such diverse domains as banking, government, health care, and law enforcement) could have dramatic consequences from a societal perspective. These key systems are often referred to as critical infrastructure. Critical infrastructure can consist of corporate information systems or systems that control key industrial processes; these specific systems are referred to as ICS (Industry Control Systems) systems. ICS systems have devolved since the 1960s from standalone systems to networked architectures that communicate across large distances, utilise wireless network and can be controlled via the Internet. ICS systems form part of many countries’ key critical infrastructure, including Australia. They are used to remotely monitor and control the delivery of essential services and products, such as electricity, gas, water, waste treatment and transport systems. The need for security measures within these systems was not anticipated in the early development stages as they were designed to be closed systems and not open systems to be accessible via the Internet. We are also seeing these ICS and their supporting systems being integrated into organisational corporate systems.
ISBN 9783319183022
ISSN 2213-8986
Language eng
DOI 10.1007/978-3-319-18302-2_14
Field of Research 080609 Information Systems Management
Socio Economic Objective 899999 Information and Communication Services not elsewhere classified
HERDC Research category B1 Book chapter
Copyright notice ©2015, Springer
Persistent URL

Document type: Book Chapter
Collection: Department of Information Systems and Business Analytics
Connect to link resolver
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 1 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 154 Abstract Views, 3 File Downloads  -  Detailed Statistics
Created: Mon, 31 Aug 2015, 11:39:39 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact