Preview

Cyber Security for Scada Systems

Satisfactory Essays
Open Document
Open Document
386 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Security for Scada Systems
Advance Defense Modeling For SCADA Systems

LITERATURE SURVEY
In 2002, In a research paper “Cyber security of the electric Power Industry” analyzes the vulnerabilities and threats facing the electric energy infrastructure, placing primary emphasis on the cyber vulnerabilities associated with control systems and related information systems and networks. The analysis provides a general overview of the electric energy sector, describing key assets, systems and functions. The report provides an analysis of direct and indirect control system vulnerabilities, and offers examples of specific security flaws. Further, it explains how deregulation and subsequent structural changes in the industry have affected the vulnerability of control systems. Moreover, the paper offers fact-based analysis of potential threats to the sector and the likely consequences should an attack occur. It also suggests protective measures, ranging from industry regulations and best practices to specific security measures.Some of the security measures are
 Minimize and secure remote connections to control networks
 Minimize and secure links between corporate networks and control systems
 Implement strong authentication / access control for control systems and related information systems where possible
 Develop control system cyber security policies and procedures
 Remove or disable unnecessary services, applications and ports

In 2006, May Permann, John Hammer, Kathy Lee, Ken Rohde in the paper titled “ Mitigations for Security Vulnerabilities Found in Control System Networks” provide general information regarding mitigation strategies for CSs.The mitigation strategies include
 Security Training
 Password Policy
 OS Level security
 Network level security
In 2006, Yu Jiaxi,Mao Anjia,Guo Zhizhong in the paper titled “Vulnerability assessment of Cyber Security in Power industry proposed two methods to assess the

You May Also Find These Documents Helpful

  • Good Essays

    IS4560 Unit 3 Assign 1

    • 779 Words
    • 3 Pages

    systems from the network diagram. A security control is any mechanism that you put in…

    • 779 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Good Essays

    IS3110 U5D1

    • 712 Words
    • 3 Pages

    There are several different types of controls that you can take advantage of for securing your servers. Below are official guidelines from the (National Institute for Standards and Technology), or NIST.…

    • 712 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Aircraft Solutions is a recognized leader in the design and fabrication of component products and services for companies in the electronics, commercial, defense, and aerospace industry. Based in Southern California, Aircraft Solutions has an excellent record of rendering services and employees that are dedicated to providing high quality customer service. The company’s workforce has a large skill base: design engineers, programmers, machinists, and assembly personnel to work in its enormous production plant and various segments of the industry. This assessment is to investigate weaknesses presented in the operations of the Aircraft Solutions business processes. Along with identifying vulnerabilities, an analysis of other related threats, concerns and risks will be presented.…

    • 745 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    ISSC 363 Week 2 Quiz

    • 320 Words
    • 2 Pages

    After implementing several security controls, what should be done to ensure the controls are performing as expected?…

    • 320 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Cyber-security demands are ever increasing in the field of Information Technology with the globalization of the internet. Disruptions due to cyber-attacks are affecting the economy, costing companies billions of dollars each year in lost revenue. To counter this problem corporations are spending more and more on infrastructure and investing to secure the cyber security vulnerabilities which range anywhere from software to hardware to networks and people that use them. Due to the complexity of information systems that interact with each other and their counter parts, the requirement to meet specific cyber security compliances have become a challenging issues for security professionals worldwide. To help with these issues, security professionals have created different standards and frameworks over the years for addressing this growing concern of vulnerabilities within enterprise systems and the critical information they hold (“Critical Security Controls,” n.d.).…

    • 3199 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Week 2 Quiz

    • 599 Words
    • 5 Pages

    After implementing several security controls, what should be done to ensure the controls are performing as expected?…

    • 599 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    This security profile presents one control function from three primary policy and procedure controls. These controls are “System/New Technology Development Life Cycle” from Management Controls, “Security Training, Education, and Awareness” from Operational Controls, and “Remote Access” from Technical Controls. These controls are selected based on the lack of resolution based on information provided fiscal year 2006, 2010 (VA Office of Inspector General, 2011) and 2011 (VA Office of Inspector General, 2012) FISMA audits.…

    • 1273 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    When securing the modern enterprise, consider that IT systems do not operate alone. Securing them involves securing their interfaces with other systems as well. It is important to know the different interconnections each system may have.…

    • 312 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    Electric Program Managers (Plant Mangers) today are undertaking many problems and tasks which are common to the job, such as maintenance, restoration, mitigation projects and planning for the current and future demands. SCADA has its advantages; it has been a big instrument in power distribution, and excellent contributor in giving more visibility to Plant Mangers, also making their occupation to some extent trouble-free and more efficient. However, the digital age leaves many different utilities companies and platforms open for attacks. Systems are put into place to curtail such catastrophes: one such system is called SCADA or Supervisory Control and Data Acquisition. SCADA is used to monitor systems, prevent system malfunctions, and in general keep the infrastructure of power plants, water and sewer plants, and treatment centers from ever having to be compromised to do the aforementioned issues.…

    • 4404 Words
    • 15 Pages
    Best Essays
  • Powerful Essays

    Scada

    • 5413 Words
    • 22 Pages

    1. Abstract The purpose of this paper is to define what SCADA systems are and their application in modern industry and infrastructure, to elucidate the reasons for rising concern over the security of these systems, to analyze the fundamental vulnerabilities and to put forth recommendations for the implementation of security in these systems.…

    • 5413 Words
    • 22 Pages
    Powerful Essays
  • Satisfactory Essays

    complicated task. Nowadays, there are various tools to cover this one. With the advance of the…

    • 6915 Words
    • 28 Pages
    Satisfactory Essays
  • Powerful Essays

    NEURAL NETWORK

    • 2214 Words
    • 9 Pages

    The three basic elements if real-time security analysis is Security monitoring, Security assessment. The problem of predicting the static security status of a large power system is a computationally demanding task [2] and it requires large amount of memory. These considerations seriously undermine the…

    • 2214 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Security Concern In SCADA

    • 929 Words
    • 4 Pages

    With this risk factor is being high in SCADA. And for any SCADA system information is like a soul. Each and every functions are depends on information if the information being hacked or corrupt the whole system would be destroyed. A perfect example of public available information is electricity power industry. In electricity power industry open source of information such as product data, maps (showing line connection and interconnections that are currently being used), show the report about Federal Energy Regulatory Commission. All of information are publicly available via internet. Use of ready to action tools and free search tools are reduced the time. These tools to easily expose the identify of SCADA. And increase the risk of attacks. Internet facing systems have identify in some critical industries. In these industries this kind of system exist but few infrastructure has work and trust on local servers. But in internet facing system, these system were designed to allow remote access for monitoring and management. Remote access has configured with internet facing access (no firewall) or weak user name or password are rising the risk. And mostly these kind of information (default information) are available on manufacturer…

    • 929 Words
    • 4 Pages
    Good Essays