Show simple item record

dc.contributor.authorBulut, Hanzele
dc.contributor.authorKAÇAR, FIRAT
dc.date.accessioned2023-02-21T07:40:56Z
dc.date.available2023-02-21T07:40:56Z
dc.date.issued2022
dc.identifier.citationBulut H., KAÇAR F., "Prevention of Cyberattacks on SCADA Systems Used in the Financial Sector", ELECTRICA, cilt.22, sa.2, ss.132-142, 2022
dc.identifier.issn2619-9831
dc.identifier.othervv_1032021
dc.identifier.otherav_0b0064cc-e659-4af6-8729-7e66740d20f0
dc.identifier.urihttp://hdl.handle.net/20.500.12627/186013
dc.identifier.urihttps://doi.org/10.54614/electrica.2022.22004
dc.description.abstractSupervisory control and data acquisition (SCADA) systems appear as smart technology products that are easy to control, provide fast communication, transmit data to relevant institutions, observed, informed and provide storage. These are the systems that inform the relevant unit of all activations that may occur in cases of sudden intervention, from industry to energy and from communication to banking systems. Supervisory control and data acquisition systems store thousands of data on monetary systems. In this article, the prevention of cyberattacks on SCADA systems used in the financial field is discussed. In the introduction part of the article, studies on cyber security are included and the importance of establishing information security policies and putting them into practice is mentioned. In the Materials and Methods section, a simulation of a possible attack on SCADA systems used in the financial field has been created and system vulnerabilities have been identified for this scenario and the results obtained as a result of exploiting the relevant vulnerabilities are given. In the Evaluation and Suggestions section, the results and evaluations of the findings obtained through vulnerability scans and attack analyzes within the scope of the relevant scenario are given and the measures to be taken are included. In addition, in the light of the information obtained in the literature research, what needs to be done to increase the security of SCADA networks has been specified. In the last section, the importance of cyber attacks, depending on the developments in the future, is mentioned by giving the access requirements, necessary times and flow chart for the attacks carried out within the scope of the scenario.
dc.language.isoeng
dc.subjectGenel Mühendislik
dc.subjectMÜHENDİSLİK, ELEKTRİK VE ELEKTRONİK
dc.subjectMühendislik
dc.subjectMühendislik, Bilişim ve Teknoloji (ENG)
dc.subjectFizik Bilimleri
dc.subjectMühendislik (çeşitli)
dc.subjectBilgi Sistemleri, Haberleşme ve Kontrol Mühendisliği
dc.subjectSinyal İşleme
dc.subjectMühendislik ve Teknoloji
dc.subjectElektrik ve Elektronik Mühendisliği
dc.titlePrevention of Cyberattacks on SCADA Systems Used in the Financial Sector
dc.typeMakale
dc.relation.journalELECTRICA
dc.contributor.departmentİstanbul Üniversitesi-Cerrahpaşa , ,
dc.identifier.volume22
dc.identifier.issue2
dc.identifier.startpage132
dc.identifier.endpage142
dc.contributor.firstauthorID3446439


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record