Preview

SCADA Vulnerabilities and Electric Power Industry

Best Essays
Open Document
Open Document
4404 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
SCADA Vulnerabilities and Electric Power Industry
SCADA Vulnerabilities and Electric Power Industry

Abstract
Electricity is an essential element of life in the United States. It is crucial to manufacturing, business companies, residences, and certain methods of shipping. A deficiency in electricity can not only cause trouble, but also financial loss due to reduced business and manufacturing production. This paper will look at the basic concepts of SCADA (Supervisory Control and Data Acquisition) systems, their vulnerabilities in regards to cyber attacks, and the efforts to increase security. It will also seek to provide some of the project management phases of SCADA for real-time implementation, while identifying advantages and disadvantages of SCADA in concert with Power Distribution.

SCADA Vulnerabilities and Electric Power Industry

Introduction
Electric Program Managers (Plant Mangers) today are undertaking many problems and tasks which are common to the job, such as maintenance, restoration, mitigation projects and planning for the current and future demands. SCADA has its advantages; it has been a big instrument in power distribution, and excellent contributor in giving more visibility to Plant Mangers, also making their occupation to some extent trouble-free and more efficient. However, the digital age leaves many different utilities companies and platforms open for attacks. Systems are put into place to curtail such catastrophes: one such system is called SCADA or Supervisory Control and Data Acquisition. SCADA is used to monitor systems, prevent system malfunctions, and in general keep the infrastructure of power plants, water and sewer plants, and treatment centers from ever having to be compromised to do the aforementioned issues.
Current SCADA Applications
SCADA systems are used by governments to monitor their power/electric, water, and treatment plants across the country. These facilities are vulnerable to “weather conditions, equipment failure, accidents” (Lakhoua & Jbira, 2012,



References: HyungJun, K. (2012) Security and vulnerability of SCADA systems over IP-based wireless sensor networks. International Journal of Distributed Sensor Networks, 1-10. doi: 10.1155/2012/268478 José María (2013, January 24) Khandelwal, T. (2013). Infusing SCADA software with real-time power management capabilities. Power Engineering, 117(9), 42 Larkin, R.D Lakhoua, M.N., & Jbira, M.K. (2012). Project management phases of SCADA system for automation of electrical distribution networks. IJSCI International Journal of Science Issues, 9(2), 157-162. http://ijcsi.org/papers/IJCSI-9-2-2-157-162.pdf Paganini, P “SCADA applications.” (2012). Control Systems Inc. Retrieved from http://www.controlsysinc.com/SCADAApplications.htm Shaline, S., Birtukan, T., Samrawit, B., Muluneh, B., & Tadesse, A U.S. Department of Energy and U.S. Environmental Protection Agency. (2006) . National action plan for energy efficiency. Retrieved from http://www.automation.com/pdf_articles/SCADA_white_paper.pd

You May Also Find These Documents Helpful

  • Powerful Essays

    ITNE455-1204A-01 U3GP3

    • 5030 Words
    • 21 Pages

    Security is embraced by the executive management staff at MJD Electronics. An important task for the Chief Security and Compliance Officer for MJD Electronics is to outline a plan that makes considerations for many of the important aspects of valid security architecture. This discussion presents more detailed information on many topics that should be included in a solid security architecture including border routers, demilitarized zones, proxy firewalls, access control lists and filters, fail-safe equipment, and more.…

    • 5030 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    RLOT2 Task 2 B rev 1

    • 569 Words
    • 2 Pages

    The complete protection of the campus infrastructure from a (D)DoS is futile however, there are measures that can be put into place which will significantly reduce the risk of an outage due to a (D)DoS. Standardizing policies and procedures, segmenting the network into functional areas, active monitoring, and a defense in depth approach will reduce the duration and severity of any future (D)DoS attack.…

    • 569 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    IS3110 PP1T

    • 777 Words
    • 5 Pages

    With the development of computer networks, the spread of malicious network activities poses great risks to the operational integrity of many organizations and imposes heavy economic burdens on life and health. Agencies within and those that supports the federal government are particularly at substantial risk for cyber attacks. Therefore, risk assessments are very important for network security management and analysis. The DLIS systems that connect via LAN and WLAN with the DLA network will be within the scope of this assessment.…

    • 777 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Aircraft Solution’s Commercial Division, connects to the rest of the world via the Internet causing hardware vulnerabilities due to the absence of security and safety that should be implemented, leaving great concern for major security threats. The Commercial Division is only able to access important…

    • 745 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Page 5 FCAPS Concepts Fault management Security management Performance management IS3120 Network Communications Infrastructure Configuration management Accounting management © ITT Educational Services, Inc. All rights reserved. Page 6 Fault Management Detection…

    • 599 Words
    • 9 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 4 Introducing ISS…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    3. CRS Report for Congress, (2004). Order Code RL32561, Risk Management and Critical Infrastructure Protection retrieved from http://www.au.af.mil/au/awc/awcgate/crs/rl32561.pdf…

    • 951 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The 16 critical infrastructure sectors identified by the Department of Homeland Security (DHS) include; Chemical, Commercial facilities, Communications, Critical manufacturing, Dams, Defense industrial base, Emergency services, Energy, Financial services, Food and agriculture, Government facilities, Health care and public health, Information technology, Nuclear reactors, nuclear materials, and waste, Transportation systems, and Water and wastewater systems. Technological advancement, increasing use of the internet, coupled with the interdependencies of information technology had and continue to have a direct effect on critical infrastructure attacks. These attacks and threats unfortunately have grown and sophisticated level of cyberattacks…

    • 323 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    This case study is a practical application of all of the knowledge you have acquired from your courses in the networking curriculum over the past two years. It will allow you to demonstrate both your knowledge and experience in networking both academically and hands-on. It will also allow you to draw on what you have learned as you worked your way through the online Microsoft IT Academy Security course. It is intended to be used as first a mid-term examination and then will also be continued as your end of class project and final exam. It presents a thorough review of concepts and applications presented in courses you have taken while at JSRCC. To complete this case study, read the scenario below and perform the tasks that follow. You will perform many of these tasks in teams of two but your final reports will be written individually. In addition to your analysis you are required to submit a formal written proposal that makes specific recommendations. You will be provided additional instructions regarding the format of your project report and other requirements.…

    • 5277 Words
    • 22 Pages
    Powerful Essays
  • Better Essays

    Power Grid

    • 1857 Words
    • 5 Pages

    But with all the good that comes from information technology there is also bad. The internet has also become a gateway for hackers to wreak havoc. In a nutshell, cyber-crime has become a headache in the 21st century because one individual can remotely attack any online system from any corner of the world crippling many economic developments. Even before the federal government can come up with effective ways of protecting its citizen from cyber-crime vulnerability, a new problem which can bring about devastating effects of equal measure has emerged. One such problem is the vulnerability of the nation’s power grid. The government had turned all of its attention to measures of countering cyber terrorism to an extent that it forgot that physical attacks on sources of power, which run these systems, could also bring equally devastating effects (Besanger et al 2013).…

    • 1857 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    E-banking has become a common trend here in our country. It has made life easier for the life of Batswana, they can easily access their checking’s, savings credit card, mortgage and loan accounts with just a few clicks, anytime anywhere. They can transfer funds, pay bills and view transaction history just with a few clicks. They do not have to leave their home to do their banking. They can access their accounts in a matter of seconds. They can receive monthly statements electronically instead of by mail and save a lot of paper work in the process. They can view their statements in order of date and are likely to find the information you are looking for quicker than flipping through pages of older paper statements. Their many fundamental benefits e-banking has brought to Batswana but unfortunately, technology is never 100 percent reliable. Online banking can compromise your security and privacy. Hackers can obtain your account number or Social Security number and make unauthorized transactions on your behalf. Someone may get your security details if you didn't close the browser window or if the password memorization feature is enabled for your bank's website.…

    • 1719 Words
    • 7 Pages
    Powerful Essays