IJSMT Journal

International Journal of Science, Strategic Management and Technology

An International, Peer-Reviewed, Open Access Scholarly Journal Indexed in recognized academic databases · DOI via Crossref The journal adheres to established scholarly publishing, peer-review, and research ethics guidelines set by the UGC

ISSN: 3108-1762 (Online)
webp (1)

Plagiarism Passed
Peer reviewed
Open Access

A COMPARATIVE REVIEW OF CYBERSECURITY FRAMEWORKS FOR INDUSTRIAL CONTROL AND SCADA SYSTEMS

AUTHORS:
Sami Ahmad
Mentor
Affiliation
Department of Information Technology Noida Institute of Engineering & Technology Greater Noida, India
CC BY 4.0 License:
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract

Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems form the backbone of critical national infrastructure, including power grids, water treatment facilities, oil and gas pipelines, and manufacturing plants. The convergence of Information Technology (IT) and Operational Technology (OT) networks, accelerated by Industry4.0 and the Industrial Internet of Things (IIoT), has dramatically expanded the attack surface of these systems. This paper presents a comprehensive review of cybersecurity frameworks specifically designed for ICS and SCADA environments, including NIST SP 800-82, IEC 62443, NERC CIP, and the MITRE ATT&CK for ICSframework. We analyze their structural components, applicability, strengths, and limitations, and propose an integrated, defense-in- depth security model that addresses the unique operational, safety, and real-time constraints inherent to industrial environments. Case studies from recent cyberattacks—including Ukraine power grid incidents and the Oldsmar water treatment plant breach—are examined to evaluate real-world framework efficacy. Findings indicate that no single framework is universally sufficient; a hybrid approach combining complementary standards yields the strongest protection posture. Future directions including AI-driven anomaly detection, zero-trust architectures, and quantum-safe cryptography in OT contexts are also discussed.

Keywords
Article Metrics
Article Views
29
PDF Downloads
3
HOW TO CITE
APA

MLA

Chicago

Copy

Ahmad, S. (2026). A Comparative Review of Cybersecurity Frameworks for Industrial Control and SCADA Systems. International Journal of Science, Strategic Management and Technology, 02(05). https://doi.org/10.55041/ijsmt.v2i5.359

Ahmad, Sami. "A Comparative Review of Cybersecurity Frameworks for Industrial Control and SCADA Systems." International Journal of Science, Strategic Management and Technology, vol. 02, no. 05, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i5.359.

Ahmad, Sami. "A Comparative Review of Cybersecurity Frameworks for Industrial Control and SCADA Systems." International Journal of Science, Strategic Management and Technology 02, no. 05 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i5.359.

References
1.D. Knapp and J. T. Langill, Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems, 2nd ed. Syngress, 2015.

2.Cybersecurity and Infrastructure Security Agency (CISA), “ICS-CERT advisories and incident summaries,” https://www.cisa.gov/ics, accessed: 2026.

3.Stouffer, J. Falco, and K. Scarfone, “Guide to industrial controlsystems (ICS) security,” National Institute of Standards and Technology, Tech. Rep. NIST Special Publication 800-82 Rev. 2, May 2015.

4.Zhu, A. Joseph, and S. Sastry, “A taxonomy of cyber attacks on SCADA systems,” in Proceedings of the International Conference on Internet of Things and Cyber, Physical and Social Computing, 2011, pp. 380–388.

5.Kriaa, L. Pietre-Cambacedes, M. Bouissou, and Y. Halgand, “A survey of approaches combining safety and security for industrial control systems,” Reliability Engineering & System Safety, vol. 139, pp. 156–178, Jul 2015.

6.Samtani, K. Chinn, C. Larson, and H. Chen, “AZSecure hacker assets portal: Cyber threat intelligence and malware analysis,” in IEEE International Conference on Intelligence and Security Informatics (ISI), 2016, pp. 19–24.

7.E. Hemsley and R. E. Fisher, “History of industrial control system cyber incidents,” Idaho National Laboratory, Tech. Rep. INL/CON-18- 44411, 2018.

8.Nazir, S. Patel, and D. Patel, “Assessing and augmenting SCADA cyber security: A survey of techniques,” Computers & Security, vol. 70,436–454, Sep 2017.

9.ISA-99 Committee, “Security for industrial automation and control systems,” International Society of Automation, Research Triangle Park, NC, Tech. Rep. ANSI/ISA-62443 Series.

10.S. McLaughlin et al., “The rise of ransomware in operational technology environments,” IEEE Security & Privacy, vol. 22, no. 1, pp. 45–53, 2024
Ethics and Compliance
✓ All ethical standards met
This article has undergone plagiarism screening and double-blind peer review. Editorial policies have been followed. Authors retain copyright under CC BY-NC 4.0 license. The research complies with ethical standards and institutional guidelines.
Indexed In
Similar Articles
Design and Detailing of Roof Top Plateform for Mechanical Units as Per AISC Design
string(16) "D.Dhavashankaran" D.Dhavashankaran, et al.
(2026)
DOI: 10.55041/ijsmt.v2i3.405
The impact of quiet quitting on employee well-being and organization performance
string(11) "Pawan singh" singh, P.
(2026)
DOI: 10.55041/ijsmt.v2i4.203
Time Series Weather Prediction Through Recurrent Neural Network
string(20) "SAYANTAN CHAKRABORTY" CHAKRABORTY, S.
(2026)
DOI: 10.55041/ijsmt.v2i3.160
Scroll to Top