{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T00:41:17Z","timestamp":1654130477199},"reference-count":27,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10,1]]},"abstract":"<p>Critical infrastructures are ubiquitous in the modern world and include electrical power systems, water, gas, and other utilities, as well as trains and transportation systems including airports. This work is concerned with Supervisory Control and Data Acquisition (SCADA) systems that are at the heart of distributed critical infrastructures within airports. Modern airports are highly competitive cost driven operations that offer a range of public and private services. Many airport systems such as car parking and building control systems are SCADA controlled. This is achieved with sensors and controllers monitored over a large, geographically disperse area. To increase efficiency and to achieve cost savings, SCADA systems are now being connected to information technology system networks using TCP\/IP. The merging of SCADA systems into the main IT network backbone is presenting new security problems for IT security managers. Historically, proprietary solutions, closed systems, ad-hoc design and implementation, and long system life cycles have led to significant challenges in assessing the true security posture of SCADA systems. To address this, this work seeks how SCADA systems are being integrated into the IT network within a modern airport. From this new standpoint we will be able to identify ways in which SCADA may be vulnerable to malicious attack via the IT network. The results of this work could offer solutions to increase security within airports.<\/p>","DOI":"10.4018\/ijcwt.2013100104","type":"journal-article","created":{"date-parts":[[2014,4,9]],"date-time":"2014-04-09T14:26:13Z","timestamp":1397053573000},"page":"32-39","source":"Crossref","is-referenced-by-count":4,"title":["SCADA Threats in the Modern Airport"],"prefix":"10.4018","volume":"3","author":[{"given":"John","family":"McCarthy","sequence":"first","affiliation":[{"name":"ServiceTec, Cranfield University, Cranfield, England"}]},{"given":"William","family":"Mahoney","sequence":"additional","affiliation":[{"name":"University of Nebraska Omaha, Omaha, NE, USA"}]}],"member":"2432","reference":[{"key":"ijcwt.2013100104-0","unstructured":"ABC. (2006). Hackers penetrate water system computers. Retrieved from http:\/\/blogs.abcnews.com\/theblotter\/2006\/10\/hackers_penetra.html"},{"key":"ijcwt.2013100104-1","unstructured":"AirTight Networks. (2008, March 3). AirTight study at worldwide airports reveals wireless security risks for travelers and airport operations. Retrieved from http:\/\/www.airtightnetworks.com\/home\/news\/press-releases\/pr\/browse\/4\/select_category\/8\/article\/123\/airtight-study-at-worldwide-airports-reveals-wireless-security-risks-for-travelers-and-airport-opera.html"},{"key":"ijcwt.2013100104-2","unstructured":"API. (2009). American Petroleum Institute. In Pipeline SCADA security (2nd ed.)."},{"key":"ijcwt.2013100104-3","unstructured":"Cheong, B. (2011, October 28). Cyber security at airports. Airports Council International \u2013 North America. Retrieved from http:\/\/aci-na.org\/sites\/default\/files\/cheong-cybersecurity-bit.pdf"},{"key":"ijcwt.2013100104-4","unstructured":"FireEye. (2012). Spear phishing attacks \u2013 Why they are successful and how to stop them. Retrieved from www.fireeye.com"},{"key":"ijcwt.2013100104-5","unstructured":"Hale, G. (2011). A new report details trends that may lead to improvements that will help to protect a system from attack. Plant Engineering. Retrieved from http:\/\/www.plantengineering.com\/single-article\/report-scada-systems-under-siege\/c6b4a830db67d2fb9d329b6fd1d04d99.html"},{"key":"ijcwt.2013100104-6","unstructured":"IEC. (2012). IEC standards. Retrieved from http:\/\/www.iec.ch\/"},{"key":"ijcwt.2013100104-7","unstructured":"Kramarenko, D. (2004). Al Qaeda in cyber space: Threats of cyberterrorism. Computer Crime Resource Center, July 27, 2004. Retrieved from http:\/\/www.crime-research.org\/news\/27.07.2004\/515\/"},{"key":"ijcwt.2013100104-8","unstructured":"Krebs, B. (2012). Chinese hackers blamed for intrusion at energy industry giant Telvent. Retrieved from http:\/\/krebsonsecurity.com\/2012\/09\/chinese-hackers-blamed-for-intrusion-at-energy-industry-giant-telvent\/"},{"key":"ijcwt.2013100104-9","first-page":"146","author":"R.Krutz","year":"2004","journal-title":"Securing SCADA systems"},{"key":"ijcwt.2013100104-10","unstructured":"Lemos, R. (2009). U.S. makes securing SCADA systems a priority. Retrieved from http:\/\/www.securityfocus.com\/news\/11351\/1"},{"key":"ijcwt.2013100104-11","unstructured":"Leyden, J. (2008). Polish teen derails tram after hacking train network. Retrieved from http:\/\/www.theregister.co.uk\/2008\/01\/11\/tram_hack\/"},{"key":"ijcwt.2013100104-12","unstructured":"Mann, C. C. (2011, December 20). Smoke screening. Vanity Fair. Retrieved from http:\/\/www.vanityfair.com\/culture\/features\/2011\/12\/tsa-insanity-201112"},{"issue":"12","key":"ijcwt.2013100104-13","first-page":"18","article-title":"How to be cyber secure.","volume":"26","author":"B.McAllister","year":"2011","journal-title":"Airport Business"},{"key":"ijcwt.2013100104-14","unstructured":"Meserve, J. (2007). Sources: Staged cyber attack reveals vulnerability in power grid. CNN, September 26, 2007. Retrieved from http:\/\/www.cnn.com\/2007\/US\/09\/26\/power.at.risk\/index.html"},{"key":"ijcwt.2013100104-15","unstructured":"NERC. (2012). Standard processes manual. Retrieved from http:\/\/www.nerc.com\/files\/Appendix_3A_StandardsProcessesManual_20120131.pdf"},{"key":"ijcwt.2013100104-16","unstructured":"Nessi, D. (2011). Are you exposed? The perils of a connected world. Airports Council International \u2013 North America. Retrieved from http:\/\/www.aci-na.org\/sites\/default\/files\/nessi-areyouexposed-bit.pdf"},{"key":"ijcwt.2013100104-17","unstructured":"NIST. (2007). NIST 800-53, \u201cRecommended security controls for federal information systems\u201d. Retrieved from http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-53-Rev2\/sp800-53-rev2-final.pdf"},{"key":"ijcwt.2013100104-18","unstructured":"NIST. (2008). NIST SP 800-82, \u201cGuide to industrial control systems (ICS) security. Draft for public comment, Sep 29, 2008, http:\/\/csrc.nist.gov\/publications\/drafts\/800-82\/draft_sp800-82-fpd.pdf"},{"key":"ijcwt.2013100104-19","unstructured":"Panetta, L. H. (2011). Hearing to consider the nomination of Hon. Leon E. Panetta to be Secretary of Defense. U.S. Senate, Committee on Armed Services. Retrieved from http:\/\/armed-services.senate.gov\/Transcripts\/2011\/06%20June\/11-47%20-%206-9-11.pdf"},{"key":"ijcwt.2013100104-20","unstructured":"Poole, R. W., Jr. (2008, December 11). Toward risk-based aviation security policy. International Transport Forum. Retrieved from http:\/\/www.internationaltransportforum.org\/jtrc\/discussionpapers\/DP200823.pdf"},{"key":"ijcwt.2013100104-21","unstructured":"Public intelligence. (2013, August). Retrieved from http:\/\/publicintelligence.net\/fbi-apt-aviation-industry\/"},{"key":"ijcwt.2013100104-22","unstructured":"SANS Institute. (2001). Computer incident response team. SANS Institute. Retrieved from http:\/\/www.sans.org\/reading_room\/whitepapers\/incident\/computer-incident-response-team_641"},{"key":"ijcwt.2013100104-23","unstructured":"Security affairs. (2013). Retrieved from http:\/\/securityaffairs.co\/wordpress\/19158\/cyber-crime\/israel-tunnel-cyber-attack.html"},{"key":"ijcwt.2013100104-24","unstructured":"US-CERT. (2012). Overview of cyber vulnerabilities. US-CERT (United State Computer Emergency Readiness Team). Retrieved from http:\/\/www.us-cert.gov\/control_systems\/csvuls.html"},{"key":"ijcwt.2013100104-25","unstructured":"Wilson, T. (2013). Sykipot malware now targeting civil aviation information. Retrieved from http:\/\/www.darkreading.com\/vulnerability\/sykipot-malware-now-targeting-civil-avia\/240160988"},{"key":"ijcwt.2013100104-26","unstructured":"Wyld, B. (2004). Cyberterrorism: Fear factor. Retrieved from http:\/\/www.crime-research.org\/analytics\/501\/"}],"container-title":["International Journal of Cyber Warfare and Terrorism"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=105190","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T00:06:37Z","timestamp":1654128397000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijcwt.2013100104"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2013,10,1]]},"references-count":27,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,10]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcwt.2013100104","relation":{},"ISSN":["1947-3435","1947-3443"],"issn-type":[{"value":"1947-3435","type":"print"},{"value":"1947-3443","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,10,1]]}}}