skip to main content
research-article
Free Access

The air gap: SCADA's enduring security myth

Published:01 August 2013Publication History
Skip Abstract Section

Abstract

Attempting to use isolation as a security strategy for critical systems is unrealistic in an increasingly connected world.

Index Terms

  1. The air gap: SCADA's enduring security myth

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image Communications of the ACM
          Communications of the ACM  Volume 56, Issue 8
          August 2013
          85 pages
          ISSN:0001-0782
          EISSN:1557-7317
          DOI:10.1145/2492007
          Issue’s Table of Contents

          Copyright © 2013 Copyright is held by the owner/author(s)

          Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 August 2013

          Check for updates

          Qualifiers

          • research-article
          • Popular
          • Un-reviewed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format