Preview

Hi How R U

Better Essays
Open Document
Open Document
2214 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hi How R U
College of Business and Administration (ENL 104)
Winter2013 – Section 1

Control systems Security

Submitted by: Name | ID | Saleh F.Saleh
Srmed kashmoula | 201030027
20101119 |

Instructor:
Dr. Suhir Al Alamy

Due Date:
Thursday, June 9 , 2013

Table of Contents:
Abstract: 3
Introduction: 4
Security of control systems and new vulnerabilities: 5
Consequences of an Attack: 6
Efforts in control systems security: 6
Control system versus IT systems security: 6
Mathematical representation: 7
System Requirements and Attack Models: 7
Example 1: 9
Example 2: 9
Conclusion: 10
References: 11

Abstract
This research discusses the possibility of a control system of being attacked by different types of attacks and via different sources. The main questions are, what is the reason that would make the security of control system a very important and interesting topic? Why this problem should be subjected to studying and analyzing? What are the needed requirements for the security of a control system? Fundamental and new requirements are provided in this search. Additionally, new mathematical frameworks are proposed to analyze those attacks. This framework, the way to detect an attack and how to survive it has been out together in this paper (Alvaro A. C´ardenas, 2008).

Introduction Control system is the best way to control the behavior of a machine or a mechanism to get desired output that satisfies the customer needs and specifications. However, there certain problems might accrue, control systems can be subjected to different types of attacks and those attacks might cause also physical damage (Alvaro A. C´ardenas, 2008). The use of control systems is to control machines, or any mechanical system one might say, to get output that would satisfy the need, control system also observe the physical processes and act accordingly as control systems are computer-based systems. Each control systems has a specific function depending on



References: * Alvaro A. C´ardenas, S. S. (2008). Research Challenges for the Security of Control Systems. * ISA-SP99, Manufacturing and Control Systems Security. (2004). Retrieved 2013, from www.isa.org: http://www.isa.org/MSTemplate.cfm?Section=Home964&Site=SP99,_Manufacturing_and_Control_Systems_Security1&Template=/ContentManagement/MSContentDisplay.cfm&ContentID=62592 * NIST Seeks Comments on Security Control. (2011). Retrieved 2013, from www.nist.gov: http://www.nist.gov/itl/csd/20110301_80053_rev_rfc.cfm

You May Also Find These Documents Helpful

  • Good Essays

    IS4560 Unit 3 Assign 1

    • 779 Words
    • 3 Pages

    systems from the network diagram. A security control is any mechanism that you put in…

    • 779 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Riordan Security Issues

    • 1371 Words
    • 6 Pages

    Palmer, M. (2003). Guide to Operating Systems Security. [University of Phoenix Custom Edition e-Text]. , : Course Technology. Retrieved September 21, 2009, from University of Phoenix, CMGT440.…

    • 1371 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Solution: A Control system has four control steps i.e. Setting performance standards, Measuring performance, Comparing performance against the standards and determining deviations, Taking action to correct problems and reinforce successes.…

    • 250 Words
    • 1 Page
    Good Essays
  • Good Essays

    What are the different types of control systems? What are some advantages and disadvantages of the various control mechanisms? How does your organization use the steps of the control process?…

    • 543 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Cyber-security demands are ever increasing in the field of Information Technology with the globalization of the internet. Disruptions due to cyber-attacks are affecting the economy, costing companies billions of dollars each year in lost revenue. To counter this problem corporations are spending more and more on infrastructure and investing to secure the cyber security vulnerabilities which range anywhere from software to hardware to networks and people that use them. Due to the complexity of information systems that interact with each other and their counter parts, the requirement to meet specific cyber security compliances have become a challenging issues for security professionals worldwide. To help with these issues, security professionals have created different standards and frameworks over the years for addressing this growing concern of vulnerabilities within enterprise systems and the critical information they hold (“Critical Security Controls,” n.d.).…

    • 3199 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    This security profile presents one control function from three primary policy and procedure controls. These controls are “System/New Technology Development Life Cycle” from Management Controls, “Security Training, Education, and Awareness” from Operational Controls, and “Remote Access” from Technical Controls. These controls are selected based on the lack of resolution based on information provided fiscal year 2006, 2010 (VA Office of Inspector General, 2011) and 2011 (VA Office of Inspector General, 2012) FISMA audits.…

    • 1273 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Control Systems – This is the way the organisation is controlled. Which include financial systems, quality systems, and rewards. The managers…

    • 817 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2010). Management of information security (3rd ed.). Boston, MA: Course Technology.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Overall Strength: in general, the article provides structure to a concept that is very intangible by: (a) describing the nature and the functions of control; (b) segregating the MCS into categories: core control system, organizational structure, and organizational culture; (c) illustrating how to apply the control model (satisfied my approach) (d) provides a basis for designing and evaluating the system. The manner, in which the model is presented, with its use of figures, further emphasizes the structure of the model. See below on further emphasis on parts (a) -(c).…

    • 2215 Words
    • 9 Pages
    Better Essays
  • Satisfactory Essays

    There are multiple ways an organization uses control mechanisms. A company could develop a control system at an organization level, business unit level and individual level. Control mechanisms are used to monitor progress and evaluate performance.…

    • 328 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    A control system is a system model in an organization that allows for a manager to monitor business activities, measure performance through planning and targeting which can unsatisfactory performance of individuals or changing organizational plans and targets as a whole. In this case the team is deciding how the types of control measures would be efficient and effective to employees at a call center for timeshare vacations. A control system ensures that the performance of employees is in line with all organizational plans as well as in response to any changing factors. With a model control…

    • 1021 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Risk Assessment

    • 362 Words
    • 2 Pages

    Software controls will monitor the use of software, prevent unauthorized into the programs. Hardware control ensures computer physical security from fires or individuals from stealing them. Computer operations controls will ensure the programmed procedures are consistently and correctly applied to the storage and processing of processing jobs back- up files and recovery procedures. Data security controls will stop unauthorized changes, destruction and access to files. System implementation controls makes sure it's properly managed, and administrative controls will implement formalized…

    • 362 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    SAMPLE Security Policy

    • 3395 Words
    • 13 Pages

    References: Hausman, K., Weiss, M., & Barrett, D. (2011). Comptia security sy0-301. (3rd ed.). Pearson Education, Inc.…

    • 3395 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    Central Processing Unit

    • 1108 Words
    • 5 Pages

    The control unit is the circuitry that controls the flow of data through the processor, and coordinates the activities of the other units within it. In a way, it is the "brain within the brain", as it controls what happens inside the processor, which in turn controls the rest of the computer. The examples of devices that require a control unit are CPUs and graphics processing units (GPUs). The modern information age would not be possible without complex control unit designs.…

    • 1108 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Management control system can be defined as a critical function in organizations. (K. A Merchant & Wim A. Van Der Stede, 2007). In other words, it can also be described as the process by which an organization secures to achieve its performance.…

    • 1585 Words
    • 7 Pages
    Powerful Essays