Asian Science Citation Index is committed to provide an authoritative, trusted and significant information by the coverage of the most important and influential journals to meet the needs of the global scientific community.  
ASCI Database
308-Lasani Town,
Sargodha Road,
Faisalabad, Pakistan
Fax: +92-41-8815544
Contact Via Web
Suggest a Journal
 
Articles by Maslina Daud
Total Records ( 2 ) for Maslina Daud
  Fatimah Sidi , A. Jabar Marzanah , Lilly Suriani Affendey , Iskandar Ishak , Nurfadhlina Mohd Sharef , Maslina Zolkepli , Tan Ming Ming , Muhammad Faidhi Abd Mokthi , Maslina Daud , Naqliyah Bt Zainuddin and Rafidah Abdul Hamid
  This study describes a comparative analysis study conducted on existing approaches, frameworks and relevant references used in field of information security. The purpose of this study is to identify suitable components in developing a threat factor profiling. By having a threat factor profiling, organizations will have a clear understanding of the threats that they face and enable them to implement a proactive incident management program that focuses on the threat components. This study also discusses the proposed threat factor profiling.
  Zakuan Firdaus , Norziana Jamil , Qais Saif Qassim , Mohd Ezanee Rusli , Norhamadi Ja`affar , Maslina Daud and HafizahChe Hasan
  Supervisory Control And Data Acquisition Systems (SCADA) monitor and control industrial and critical infrastructure functions such as electricity, oil, water and natural gas production and distribution processes. Consequently, failure in the intended operation of SCADA system results in catastrophic consequences. With the increased interconnectivity of SCADA systems and the commercial availability of cloud computing, SCADA systems have increasingly adopted Internet of Things (IoT) technologies to significantly reduce infrastructure costs and increase ease of maintenance and integration. As a result, the exposure of these systems to cyber threats has increased enormously. Therefore, there is a necessity to identify, remediate and mitigate system’s security vulnerabilities to protect and prevent possible attacks. This study serves two folds; firstly, different types of vulnerabilities in SCADA systems have been identified and reviewed. Secondly, two test cases have been presented to demonstrate the severity of the identified vulnerabilities on SCADA systems. This study draws attention to the impact of threat on SCADA systems and their consequences.
 
 
 
Copyright   |   Desclaimer   |    Privacy Policy   |   Browsers   |   Accessibility