February 2011, Vol. 238 No. 2

Features

SCADA Networking Facilitated Using DNP3

Although malware has, for good reason, recently grabbed the attention when it comes to SCADA security, the other threats have not exactly gone away. Since the Stuxnet worm specifically targeted SCADA systems, that is all the better reason to ensure that vulnerability assessments and implementation measures encompass an even broader range of threats to one’s system. Among the more traditional threats to SCADA systems are eavesdropping and spoofing. Since SCADA networks are often wireless with the communications infrastructure located outside areas that the operator can physically secure, third parties can readily monitor transmissions. If data security is critical, encrypti

Log in to view this article.

Not Yet A Subscriber? Here are Your Options.

1) Start a FREE TRIAL SUBSCRIPTION and gain access to all articles in the current issue of Pipeline & Gas Journal magazine.

2) SUBSCRIBE to Pipeline & Gas Journal magazine in print or digital format and gain ACCESS to the current issue as well as to 3 articles from the PGJ archives per month. $199 for an annual subscription*.

3) Start a FULL ACCESS PLAN SUBSCRIPTION and regain ACCESS to this article, the current issue, all past issues in the PGJ Archive, access to all special reports, special focus supplements and more. $1,395 for an annual subscription.  For information about group rates or multi-year terms, contact J'Nette Davis-Nichols at Jnette.Davis-Nichols@GulfEnergyInfo.com or +1 713.520.4426*.

 

 

*Access will be granted the next business day.

Related Articles

Comments

{{ error }}
{{ comment.comment.Name }} • {{ comment.timeAgo }}
{{ comment.comment.Text }}