SCADA Threats in the Modern Airport
In this research paper Dr John McCarthy, a leading authority on Cyber Security strategy and implementation, conducts a detailed study concerned with Supervisory Control and Data Acquisition (SCADA) systems that are at the heart of distributed critical infrastructures within airports.
Written by Dr John McCarthy
15 February 2018
About the author
Dr John McCarthy is an authority on Cyber Security strategy, development and implementation. He holds a PhD in Cyber Security and e-Business Development and is an internationally recognized author of a number of works discussing all aspects of Cyber Security in the modern world including GDPR compliance. John is frequently invited to sit on expert panels and appear as an expert speaker at well-known Cyber Security events. John is also a leading expert on social engineering awareness training and best practice. Furthermore, John’s impressive list of posts include seats on a number of prominent US committees that offer advice and policy guidance to the US government on Cyber Security matters. He is also panel member of the American Transport Research Board researching Cyber Security best practice for airports throughout North America. He is an active member of the Euro CIO Cyber Security Committee, ACI EUROPE Aviation Security Committee, the British Computer Society (BSC), Elite, the International Committee on Information Warfare and Security and a Member of the Worshipful Company of Information Technologists. John is also a Freeman of the City of London.
The project profession can thrive in the fourth industrial revolution
The social mobility impact of apprenticeships
Key benefits of earning a Project Management certification
The Cloud Credential Council's Global Digital Skills Survey 2019 Report
An introduction to ITIL4 and service management
QA’s teaching and learning approach
Cyber Security for everyone - what we all should know
Cyber Attacks - Most of them are not as high-tech as you'd think
Is the Apprenticeships Levy helping to close the tech skills gap?
How does Ransomware-as-a-Service work?