Preview

Cyber Security for Scada Systems

Satisfactory Essays
Open Document
Open Document
386 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Security for Scada Systems
Advance Defense Modeling For SCADA Systems

LITERATURE SURVEY
In 2002, In a research paper “Cyber security of the electric Power Industry” analyzes the vulnerabilities and threats facing the electric energy infrastructure, placing primary emphasis on the cyber vulnerabilities associated with control systems and related information systems and networks. The analysis provides a general overview of the electric energy sector, describing key assets, systems and functions. The report provides an analysis of direct and indirect control system vulnerabilities, and offers examples of specific security flaws. Further, it explains how deregulation and subsequent structural changes in the industry have affected the vulnerability of control systems. Moreover, the paper offers fact-based analysis of potential threats to the sector and the likely consequences should an attack occur. It also suggests protective measures, ranging from industry regulations and best practices to specific security measures.Some of the security measures are
 Minimize and secure remote connections to control networks
 Minimize and secure links between corporate networks and control systems
 Implement strong authentication / access control for control systems and related information systems where possible
 Develop control system cyber security policies and procedures
 Remove or disable unnecessary services, applications and ports

In 2006, May Permann, John Hammer, Kathy Lee, Ken Rohde in the paper titled “ Mitigations for Security Vulnerabilities Found in Control System Networks” provide general information regarding mitigation strategies for CSs.The mitigation strategies include
 Security Training
 Password Policy
 OS Level security
 Network level security
In 2006, Yu Jiaxi,Mao Anjia,Guo Zhizhong in the paper titled “Vulnerability assessment of Cyber Security in Power industry proposed two methods to assess the

You May Also Find These Documents Helpful

  • Good Essays

    IS4560 Unit 3 Assign 1

    • 779 Words
    • 3 Pages

    systems from the network diagram. A security control is any mechanism that you put in…

    • 779 Words
    • 3 Pages
    Good Essays
  • Good Essays

    IS3110 U5D1

    • 712 Words
    • 3 Pages

    There are several different types of controls that you can take advantage of for securing your servers. Below are official guidelines from the (National Institute for Standards and Technology), or NIST.…

    • 712 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Aircraft Solutions is a recognized leader in the design and fabrication of component products and services for companies in the electronics, commercial, defense, and aerospace industry. Based in Southern California, Aircraft Solutions has an excellent record of rendering services and employees that are dedicated to providing high quality customer service. The company’s workforce has a large skill base: design engineers, programmers, machinists, and assembly personnel to work in its enormous production plant and various segments of the industry. This assessment is to investigate weaknesses presented in the operations of the Aircraft Solutions business processes. Along with identifying vulnerabilities, an analysis of other related threats, concerns and risks will be presented.…

    • 745 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    ISSC 363 Week 2 Quiz

    • 320 Words
    • 2 Pages

    After implementing several security controls, what should be done to ensure the controls are performing as expected?…

    • 320 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Common security countermeasures typically found in an IT infrastructure  Risk assessment approach to securing an IT infrastructure  Risk mitigation strategies to shrink the information security gap NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 3 EXPLORE: CONCEPTS NT2580…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Cyber-security demands are ever increasing in the field of Information Technology with the globalization of the internet. Disruptions due to cyber-attacks are affecting the economy, costing companies billions of dollars each year in lost revenue. To counter this problem corporations are spending more and more on infrastructure and investing to secure the cyber security vulnerabilities which range anywhere from software to hardware to networks and people that use them. Due to the complexity of information systems that interact with each other and their counter parts, the requirement to meet specific cyber security compliances have become a challenging issues for security professionals worldwide. To help with these issues, security professionals have created different standards and frameworks over the years for addressing this growing concern of vulnerabilities within enterprise systems and the critical information they hold (“Critical Security Controls,” n.d.).…

    • 3199 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Week 2 Quiz

    • 599 Words
    • 5 Pages

    After implementing several security controls, what should be done to ensure the controls are performing as expected?…

    • 599 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    This security profile presents one control function from three primary policy and procedure controls. These controls are “System/New Technology Development Life Cycle” from Management Controls, “Security Training, Education, and Awareness” from Operational Controls, and “Remote Access” from Technical Controls. These controls are selected based on the lack of resolution based on information provided fiscal year 2006, 2010 (VA Office of Inspector General, 2011) and 2011 (VA Office of Inspector General, 2012) FISMA audits.…

    • 1273 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    When securing the modern enterprise, consider that IT systems do not operate alone. Securing them involves securing their interfaces with other systems as well. It is important to know the different interconnections each system may have.…

    • 312 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Electric grids, power plants, hospitals, etc., rely largely on computers and the internet to store and access data. If the security to these facilities are breached, skewed data and power outages are a real possibility. Therefore, it could lead to serious economic problems, and possibly, even death. With all that said, cyberwarfare is not something to be taken lightly, in fact, the dangers are extremely significant. Additionally, since technology is so prominent, it is a convenient method of…

    • 445 Words
    • 2 Pages
    Good Essays
  • Best Essays

    Electricity is an essential element of life in the United States. It is crucial to manufacturing, business companies, residences, and certain methods of shipping. A deficiency in electricity can not only cause trouble, but also financial loss due to reduced business and manufacturing production. This paper will look at the basic concepts of SCADA (Supervisory Control and Data Acquisition) systems, their vulnerabilities in regards to cyber attacks, and the efforts to increase security. It will also seek to provide some of the project management phases of SCADA for real-time implementation, while identifying advantages and disadvantages of SCADA in concert with Power Distribution.…

    • 4404 Words
    • 15 Pages
    Best Essays
  • Powerful Essays

    Scada

    • 5413 Words
    • 22 Pages

    1. Abstract The purpose of this paper is to define what SCADA systems are and their application in modern industry and infrastructure, to elucidate the reasons for rising concern over the security of these systems, to analyze the fundamental vulnerabilities and to put forth recommendations for the implementation of security in these systems.…

    • 5413 Words
    • 22 Pages
    Powerful Essays
  • Powerful Essays

    NEURAL NETWORK

    • 2214 Words
    • 9 Pages

    The three basic elements if real-time security analysis is Security monitoring, Security assessment. The problem of predicting the static security status of a large power system is a computationally demanding task [2] and it requires large amount of memory. These considerations seriously undermine the…

    • 2214 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Security Concern In SCADA

    • 929 Words
    • 4 Pages

    With this risk factor is being high in SCADA. And for any SCADA system information is like a soul. Each and every functions are depends on information if the information being hacked or corrupt the whole system would be destroyed. A perfect example of public available information is electricity power industry. In electricity power industry open source of information such as product data, maps (showing line connection and interconnections that are currently being used), show the report about Federal Energy Regulatory Commission. All of information are publicly available via internet. Use of ready to action tools and free search tools are reduced the time. These tools to easily expose the identify of SCADA. And increase the risk of attacks. Internet facing systems have identify in some critical industries. In these industries this kind of system exist but few infrastructure has work and trust on local servers. But in internet facing system, these system were designed to allow remote access for monitoring and management. Remote access has configured with internet facing access (no firewall) or weak user name or password are rising the risk. And mostly these kind of information (default information) are available on manufacturer…

    • 929 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    complicated task. Nowadays, there are various tools to cover this one. With the advance of the…

    • 6915 Words
    • 28 Pages
    Satisfactory Essays