Forensic Readiness for SCADA/ICS Incident Response

Peter Eden, Andrew Blyth, Pete Burnap, Yulia Cherdantseva, Kevin Jones, Hugh Soulsby, Kristan Stoddart

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review


The actions carried out following any cyber-attack are vital in limiting damage, regaining control and determining the cause and those responsible. Within SCADA and ICS environments there is certainly no exception. Critical National Infrastructure (CNI) relies heavily on SCADA systems to monitor and control critical processes. Many of these systems span huge geographical areas and contain thousands of individual devices, across an array of asset types. When an incident occurs, those assets contain forensic artefacts, which can be thought of as any data that provides explanation to the current state of the SCADA system.
Knowing what devices exist within the network and the tools and methods to retrieve data from them are some of the biggest challenges for incident response within CNI. This paper aims to identify those assets and their forensic value whilst providing the tools needed to perform data acquisition in a forensically sound
manner. It will also discuss the key stages in which the incident response process can be managed.
Original languageEnglish
Title of host publicationProceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016
Place of PublicationSwindon, UK
PublisherBCS Learning Development Ltd.
Number of pages9
ISBN (Print)978-1-78017-3573
Publication statusPublished - Aug 2016
Event4th International Symposium for ICS & SCADA Cyber Security Research 2016 - Queen's University Belfast , Belfast, United Kingdom
Duration: 23 Aug 201625 Aug 2016
Conference number: 4th

Publication series

NameICS-CSR '16
PublisherBCS Learning Development Ltd.


Conference4th International Symposium for ICS & SCADA Cyber Security Research 2016
Abbreviated titleICS-CSR 2016
Country/TerritoryUnited Kingdom


  • SCADA forensics
  • critical infrastructure
  • digital forensics
  • incident response


Dive into the research topics of 'Forensic Readiness for SCADA/ICS Incident Response'. Together they form a unique fingerprint.

Cite this