lastID = -281053
Skip to main content Skip to top navigation Skip to site search
Top of page
  • My citations options
    Web Back (from Web)
    Chicago Back (from Chicago)
    MLA Back (from MLA)
Close action menu

You need to login to use this feature.

Please wait a moment…
Please wait while we update your results...
Please wait a moment...
Description: Access Water
Context Menu
Description: W12-Proceedings
Securing Critical Control Systems in the Water Sector – Where Do I Begin?
  • Browse
  • Compilations
    • Compilations list
  • Subscriptions
Tools

Related contents

Loading related content

Workflow

No linked records yet

X
  • Current: 2020-03-31 01:09:06 Adam Phillips
  • 2020-03-31 01:09:05 Adam Phillips
  • 2020-02-01 04:01:21 Administrator
  • 2020-02-01 04:01:20 Administrator
Description: Access Water
  • Browse
  • Compilations
  • Subscriptions
Log in
0
Accessibility Options

Base text size -

This is a sample piece of body text
Larger
Smaller
  • Shopping basket (0)
  • Accessibility options
  • Return to previous
Description: W12-Proceedings
Securing Critical Control Systems in the Water Sector – Where Do I Begin?

Securing Critical Control Systems in the Water Sector – Where Do I Begin?

Securing Critical Control Systems in the Water Sector – Where Do I Begin?

  • New
  • View
  • Details
  • Reader
  • Default
  • Share
  • Email
  • Facebook
  • Twitter
  • LinkedIn
  • New
  • View
  • Default view
  • Reader view
  • Data view
  • Details

This page cannot be printed from here

Please use the dedicated print option from the 'view' drop down menu located in the blue ribbon in the top, right section of the publication.

screenshot of print menu option

Description: W12-Proceedings
Securing Critical Control Systems in the Water Sector – Where Do I Begin?
Abstract
Public health and safety are dependent on the availability and reliability of water systems. Cyber attacks on information technology (IT) networks are well known, but attacks on the control systems used to monitor and control plant processes are increasing in frequency and in their potential threat to public safety. The highly sophisticated Stuxnet worm discovered in 2010 was the first publicly known malware to specifically target industrial control systems. Stuxnet is proof that potential threats to critical infrastructure can no longer be ignored.IT professionals are responsible for ensuring the availability and security of enterprise networks. However, protecting an IT network from a cyber attack can be very different from protecting an industrial control system. As a result, plant engineering and operations will need to take an active role in developing a security plan protecting critical control systems to minimize the potentially adverse impact of a cyber event on public health and safety. For many, the greatest challenge in developing a security plan is knowing where to begin.The paper, Securing Critical Control Systems in the Water Sector – Where Do I Begin? will review existing and emerging threats to critical infrastructure and the potential impact of cyber events on water systems. An overview will be provided of industry standards, guidelines and recommendations, and other available resources to aid in the development of a utility security plan essential for protecting critical assets
Public health and safety are dependent on the availability and reliability of water systems. Cyber attacks on information technology (IT) networks are well known, but attacks on the control systems used to monitor and control plant processes are increasing in frequency and in their potential threat to public safety. The highly sophisticated Stuxnet worm discovered in 2010 was the first publicly...
Author(s)
Don Dickinson
SourceProceedings of the Water Environment Federation
Document typeConference Paper
PublisherWater Environment Federation
Print publication date Sep, 2012
ISSN1938-6478
DOI10.2175/193864712811704288
Volume / Issue2012 / 6
Content sourceWEFTEC
Copyright2012
Word count243

Purchase price $11.50

Get access
Log in Purchase content Purchase subscription
You may already have access to this content if you have previously purchased this content or have a subscription.
Need to create an account?

You can purchase access to this content but you might want to consider a subscription for a wide variety of items at a substantial discount!

Purchase access to 'Securing Critical Control Systems in the Water Sector – Where Do I Begin?'

Add to cart
Purchase a subscription to gain access to 18,000+ Proceeding Papers, 25+ Fact Sheets, 20+ Technical Reports, 50+ magazine articles and select Technical Publications' chapters.
Loading items
There are no items to display at the moment.
Something went wrong trying to load these items.
Description: W12-Proceedings
Securing Critical Control Systems in the Water Sector – Where Do I Begin?
Pricing
Non-member price: $11.50
Member price:
-281053
Get access
-281053
Log in Purchase content Purchase subscription
You may already have access to this content if you have previously purchased this content or have a subscription.
Need to create an account?

You can purchase access to this content but you might want to consider a subscription for a wide variety of items at a substantial discount!

Purchase access to 'Securing Critical Control Systems in the Water Sector – Where Do I Begin?'

Add to cart
Purchase a subscription to gain access to 18,000+ Proceeding Papers, 25+ Fact Sheets, 20+ Technical Reports, 50+ magazine articles and select Technical Publications' chapters.

Details

Description: W12-Proceedings
Securing Critical Control Systems in the Water Sector – Where Do I Begin?
Abstract
Public health and safety are dependent on the availability and reliability of water systems. Cyber attacks on information technology (IT) networks are well known, but attacks on the control systems used to monitor and control plant processes are increasing in frequency and in their potential threat to public safety. The highly sophisticated Stuxnet worm discovered in 2010 was the first publicly known malware to specifically target industrial control systems. Stuxnet is proof that potential threats to critical infrastructure can no longer be ignored.IT professionals are responsible for ensuring the availability and security of enterprise networks. However, protecting an IT network from a cyber attack can be very different from protecting an industrial control system. As a result, plant engineering and operations will need to take an active role in developing a security plan protecting critical control systems to minimize the potentially adverse impact of a cyber event on public health and safety. For many, the greatest challenge in developing a security plan is knowing where to begin.The paper, Securing Critical Control Systems in the Water Sector – Where Do I Begin? will review existing and emerging threats to critical infrastructure and the potential impact of cyber events on water systems. An overview will be provided of industry standards, guidelines and recommendations, and other available resources to aid in the development of a utility security plan essential for protecting critical assets
Public health and safety are dependent on the availability and reliability of water systems. Cyber attacks on information technology (IT) networks are well known, but attacks on the control systems used to monitor and control plant processes are increasing in frequency and in their potential threat to public safety. The highly sophisticated Stuxnet worm discovered in 2010 was the first publicly...
Author(s)
Don Dickinson
SourceProceedings of the Water Environment Federation
Document typeConference Paper
PublisherWater Environment Federation
Print publication date Sep, 2012
ISSN1938-6478
DOI10.2175/193864712811704288
Volume / Issue2012 / 6
Content sourceWEFTEC
Copyright2012
Word count243

Actions, changes & tasks

Outstanding Actions

Add action for paragraph

Current Changes

Add signficant change

Current Tasks

Add risk task

Connect with us

Follow us on Facebook
Follow us on Twitter
Connect to us on LinkedIn
Subscribe on YouTube
Powered by Librios Ltd
Powered by Librios Ltd
Authors
Terms of Use
Policies
Help
Accessibility
Contact us
Copyright © 2024 by the Water Environment Federation
Loading items
There are no items to display at the moment.
Something went wrong trying to load these items.
Description: WWTF Digital Boot 180x150
WWTF Digital (180x150)
Created on Jul 02
Websitehttps:/­/­www.wef.org/­wwtf?utm_medium=WWTF&utm_source=AccessWater&utm_campaign=WWTF
180x150
Don Dickinson. Securing Critical Control Systems in the Water Sector – Where Do I Begin?. Alexandria, VA 22314-1994, USA: Water Environment Federation, 2018. Web. 6 Jun. 2025. <https://www.accesswater.org?id=-281053CITANCHOR>.
Don Dickinson. Securing Critical Control Systems in the Water Sector – Where Do I Begin?. Alexandria, VA 22314-1994, USA: Water Environment Federation, 2018. Accessed June 6, 2025. https://www.accesswater.org/?id=-281053CITANCHOR.
Don Dickinson
Securing Critical Control Systems in the Water Sector – Where Do I Begin?
Access Water
Water Environment Federation
December 22, 2018
June 6, 2025
https://www.accesswater.org/?id=-281053CITANCHOR