February 2011, Vol. 238 No. 2


SCADA Networking Facilitated Using DNP3

Although malware has, for good reason, recently grabbed the attention when it comes to SCADA security, the other threats have not exactly gone away. Since the Stuxnet worm specifically targeted SCADA systems, that is all the better reason to ensure that vulnerability assessments and implementation measures encompass an even broader range of threats to one’s system. Among the more traditional threats to SCADA systems are eavesdropping and spoofing. Since SCADA networks are often wireless with the communications infrastructure located outside areas that the operator can physically secure, third parties can readily monitor transmissions. If data security is critical, encrypti

Log in to view this article.

Not Yet A Subscriber? Here are Your Options.

1) Start a FREE TRIAL SUBSCRIPTION and gain access to all articles in the current issue of Pipeline & Gas Journal magazine.

2) Start your full access subscription to Pipeline & Gas Journal and gain UNLIMITED access to this article, the current issue, all past issues in the technical archive, access to all special reports, special focus supplements and more. Pricing start at $395/year.   

*Access will be granted the next business day.


Related Articles


{{ error }}
{{ comment.comment.Name }} • {{ comment.timeAgo }}
{{ comment.comment.Text }}