IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Cyber Security in Liquid Petroleum Pipelines

Cyber Security in Liquid Petroleum Pipelines
View Sample PDF
Author(s): Morgan Henrie (MH Consulting, Inc., USA)
Copyright: 2012
Pages: 23
Source title: Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies
Source Author(s)/Editor(s): Junaid Ahmed Zubairi (SUNY at Fredonia, USA)and Athar Mahboob (National University of Sciences & Technology, Pakistan)
DOI: 10.4018/978-1-60960-851-4.ch011

Purchase

View Cyber Security in Liquid Petroleum Pipelines on the publisher's website for pricing and purchasing information.

Abstract

The world’s critical infrastructure includes entities such as the water, waste water, electrical utilities, and the oil and gas industry. In many cases, these rely on pipelines that are controlled by supervisory control and data acquisition (SCADA) systems. SCADA systems have evolved to highly networked, common platform systems. This evolutionary process creates expanding and changing cyber security risks. The need to address this risk profile is mandated from the highest government level. This chapter discusses the various processes, standards, and industry based best practices that are directed towards minimizing these risks.

Related Content

Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini. © 2024. 14 pages.
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 30 pages.
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan. © 2024. 19 pages.
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi. © 2024. 14 pages.
Meryeme Bououchma, Brahim Herrou. © 2024. 14 pages.
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 16 pages.
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly. © 2024. 10 pages.
Body Bottom