Preview

Security Concern In SCADA

Good Essays
Open Document
Open Document
929 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security Concern In SCADA
1.5. Security Concern For any infrastructure or industry the most important part is it's security. Basically the prime target to secure the industry from physical attack. In electric power industry physical attack is shutdown, break down etc. In chemical industry physical attack is leaking of chemical etc. These kind of attacks is known as physical attacks. physical attacks are done by anybody like human error, computer system failure. Second type of attack is cyber attacks. Cyber attacks are done through computer. These kind of attacks are like to use of any industry's controller by third party (hackers). In recent more years, this kind of attacks are growing fast and terrorist groups, frustrated employees, hostile government use this attacks. …show more content…
So this increased connectivity have advantages and also have disadvantages. SCADA works on real time information so it is allow to engineers and production managers to control and monitor the system at every point. If the network is secured, it is hard to monitor for anybody at every network point that's why it uses the unsecured network as well as internet. In which each device send the information to its local or remote controller through internet or its local network. According to this theory, anyone operate this system with full security because the entire system is …show more content…
With this risk factor is being high in SCADA. And for any SCADA system information is like a soul. Each and every functions are depends on information if the information being hacked or corrupt the whole system would be destroyed. A perfect example of public available information is electricity power industry. In electricity power industry open source of information such as product data, maps (showing line connection and interconnections that are currently being used), show the report about Federal Energy Regulatory Commission. All of information are publicly available via internet. Use of ready to action tools and free search tools are reduced the time. These tools to easily expose the identify of SCADA. And increase the risk of attacks. Internet facing systems have identify in some critical industries. In these industries this kind of system exist but few infrastructure has work and trust on local servers. But in internet facing system, these system were designed to allow remote access for monitoring and management. Remote access has configured with internet facing access (no firewall) or weak user name or password are rising the risk. And mostly these kind of information (default information) are available on manufacturer

You May Also Find These Documents Helpful

  • Powerful Essays

    Main Security Concerns: As a rapidly growing business that primarily utilizes IT resources for intranet company communications between and among a single home office and three satellite offices; internal network access controls and remote employee user’s access controls seem to be of primary importance. Priority number one should be hardening and the safeguarding of access and data integrity of the Oracle database servers housed as the main office in Reston, VA. And separately at the San Diego satellite office A comprehensive security policy will be developed and approved by management that will detail the specific guidelines administrators must follow when allowed admin access to company IT resources and services, and when and how those permissions should be denied or allowed. Additionally, auditing and logging of critical events should be implemented utilizing a reliable SEIM (Security Information and Event Management) system. Moreover, control of user access from remote sites via the company intranet via VPN’s and remote access via RADIUS should be strengthened and monitored for both qualitative and quantitate analysis and measuring. Cryptographic techniques will be enhanced and login and password requirements will be strengthened. Of significant importance is the company web presence and corporate access to its knowledge base portal within the company intranet. The company web presence is of vital importance to allow customers to access information concerning the company’s products and services. The knowledge portal is vital for company employees to have access to propriety information while protecting their confidentiality, integrity, and availability of the data. We will separate and hardened both the web server and the knowledge portal via…

    • 2606 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    that is used to connect computers and the users. Infrastructure also includes the transmission media such as the lines through telephones television satellites as well as any sort of routers antennas and any other devices that would control the transmission paths. When it comes to managing infrastructures this refers to managing the computing facilities as well as the key elements such as the computer databases the information management systems and the application software. One of the risks in managing the IS would be the globalization issues. Globalization does have its positive side such as opportunities for companies to grow however with that there is also the chance of complex array of operating risks. Without the right infrastructure to conquer these sorts of risks it can lead to company shutdown and no company wants that to happen. Here are a few ways to prevent that from happening.…

    • 774 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Between every network and the outside host of threats there is a first line of defense. For almost every network this will be a firewall. A firewall can be both hardware and software and is usually a combination of the two. A firewall creates a barrier between networks. Any outside computer or client must pass through the firewall to access the network or its resources. Only a computer or system that has proper access can easily access a network protected by a properly configured firewall. Though it is not infallible, a firewall is the first and perhaps best means of security…

    • 855 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Awareness of these kinds of attacks is the key and to be prepared on the part of management and the user. They must be made aware of the consequences of their actions while using the network and accessing the data. The users of the network and system need to be prepared in case of an attack and have knowledge of…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    After further review to three relevant sections: hardware, software and policy, Aircraft Solutions needs special attention to hardware and policy relates processes. The Defense Division is routed through Headquarters, the Commercial Division is however directly connected to the Internet, but no firewall has been setup. This action is a concern for Aircraft Solutions. A policy vulnerability that has been noticed is the rule that states “routers and firewalls rule-sets would be evaluated once in every two years”. With today’s world and technology changing ever so often security threats happen by Internet hackers, on an everyday basis. This is a rather impractical and long time span for a company to ensure that their security measures are up-to-date. These weaknesses are detailed in the sections below:…

    • 745 Words
    • 3 Pages
    Good Essays
  • Better Essays

    The second vulnerability is the policies that are in place to evaluate the firewalls, routers and the personnel to maintain them. There should always be checks and balances with any system. This means you have two sets of personnel maintaining the system. One set of personnel on site, such as a security officer and an assistant security officer to maintain these controls. And the second set being from an outside vendor that would continuously monitor Aircraft Solution’s Systems regularly. This would deter any internal or external malicious attacks to the…

    • 870 Words
    • 4 Pages
    Better Essays
  • Good Essays

    operations in organisations and business environments. Security threats on the remote machines can always be averted easily and their impacts are not as serious compared to threats on the central computer system (Kaufman et al, 2002).The central computer system is a valuable resource that must be secured to ensure continued operation in the organisation. Securing a central computer network is the key to ensuring network security in any institution (Kaeo, 1999).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Good Essays

    In order to produce results, information must be communicated and shared amongst an organization. This information can be shared in various ways such as verbal and technical communications. Information within an organization is used to comprehend the importance of the input and outputs of the business processes in such ways as collaborations of ideas, sharing of concepts, rules, regulations, and business processes. Every organization has data, files, business, and personal records. Organizations have become more reliant on technology. With this reliance comes a sense of dependence on technology for daily business operations, therefore it is very important that organizations protect their information because they can easily be exposed and vulnerable to cyber attacks.…

    • 614 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    When securing the modern enterprise, consider that IT systems do not operate alone. Securing them involves securing their interfaces with other systems as well. It is important to know the different interconnections each system may have.…

    • 312 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    When we ask what “Critical Infrastructure is?” Critical infrastructure is the backbone of our nation’s economy, security, and health. It is clear that we have the power in our homes, the water we drink, the transportation that moves us, and the communication systems we rely on to stay in touch with friends and family. The vitalization of critical infrastructure according to research and the” Department of Homeland Security, 2013” is the assets, systems, and networks, whether physical or virtual. It is so…

    • 1767 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Software systems and centralized databases containing the sensitive of an organization have become the norm in society. Because this information includes the private information of the organization and the consumer, the organization has a responsibility to have the necessary security measures in place to stop attacks as well as have the necessary expertise to provide an effective response in the event of the AIS system failing. The management should be held responsible for ensuring…

    • 851 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Power Grid

    • 1857 Words
    • 5 Pages

    But with all the good that comes from information technology there is also bad. The internet has also become a gateway for hackers to wreak havoc. In a nutshell, cyber-crime has become a headache in the 21st century because one individual can remotely attack any online system from any corner of the world crippling many economic developments. Even before the federal government can come up with effective ways of protecting its citizen from cyber-crime vulnerability, a new problem which can bring about devastating effects of equal measure has emerged. One such problem is the vulnerability of the nation’s power grid. The government had turned all of its attention to measures of countering cyber terrorism to an extent that it forgot that physical attacks on sources of power, which run these systems, could also bring equally devastating effects (Besanger et al 2013).…

    • 1857 Words
    • 5 Pages
    Better Essays
  • Better Essays

    In order to answer the research questions, the monograph will examine the Department of Homeland Security’s. The monograph will also explain what Critical Infrastructure Protection (CIP) initiatives are, what are protected, and the methods used to protect our assets. Also, the description of the vulnerabilities IS professionals need to be concerned with when protecting the U.S.’s critical infrastructure will be explained. The monograph will further evaluate the effectiveness of IS professionals in regard to protecting the U.S.’s critical infrastructure, and suggestions on methods improving the protection of our critical infrastructure and justifications recommendation will also be elaborated on (University of Strayer Materials, May, 2013).…

    • 1279 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Effects of a Cyber Attack

    • 791 Words
    • 4 Pages

    Moteff, J ; Copeland, C ; Fischer, John Critical Infrastructures: What Makes an Infrastructure Critical? Retrieved on May 2, 2010 from…

    • 791 Words
    • 4 Pages
    Good Essays
  • Good Essays

    There are things you need to consider when deciding on what type of system protection you are going to use. The things you need to consider are reliability, selectivity, speed, simplicity, and economics. Reliability consists of assurance that the protection system that is in place will operate correctly. Selectivity consists of ensuring that the amount of the service area disturbed is kept to a minimum. The speed of the system must minimize the duration of the fault and also minimize the amount of damage that may occur to the system. The use of the minimal amount of equipment to achieve the type of protection you want is also important. This will keep things less complicated and also relates to the last thing to consider in a protection system which is cost. You want the maximum amount of protection but at a minimal cost. All of these factors help build a cost effective and reliable protection system that will protect our infrastructure.…

    • 334 Words
    • 2 Pages
    Good Essays