Preview

Scada

Powerful Essays
Open Document
Open Document
22885 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Scada
ABSTRACT Supervisory control and data acquisition (SCADA) allows a utility operator to monitor and control processes that are distributed among various remote sites. The goal of this thesis is to develop a risk management framework that uses existing probabilistic risk assessment (PRA) methodology to quantify the risks of willful threats to water utility SCADA systems. This framework can assist decisionmakers in understanding the risks of cyber intrusion, their consequences and tradeoffs in order to maximize the survivability of the system. Surety, a measure of survivability, is defined as a measure of system performance under an unusual loading. A survey is conducted to understand the current state of SCADA in water utilities, to document information on cyber intrusion, and to determine the concerns of administrators on system security. Using hierarchical holographic modeling (HHM), sources of cyber risk to SCADA are identified. Event trees and fault trees are used to model the probabilistic consequences of cyber intrusion on water supply systems. Cost, surety, expected level of percentage of water flow reduction, and conditional expected level of percentage of water flow reduction are introduced as performance measures to evaluate policy options. Alternatives are generated and then compared using multiobjective tradeoff analysis. Lastly, a prototype city is analyzed to demonstrate the applicability of the developed methodology. The methodological framework for managing cyber risk to water utility SCADA systems constitutes the major contribution of the thesis.
TABLE OF CONTENTS • ABSTRACT * CHAPTER 1 INTRODUCTION * • 1.1 Cyber Attacks * 1.2 Stakeholders * 1.3 Statement of Need * 1.4 Thesis Tasks * 1.5 Thesis Overview * CHAPTER 2 SUPERVISORY CONTROL AND DATA ACQUISITION * • 2.1 Introduction * 2.2 Master Terminal Unit * 2.3 Remote Terminal



References: Applegate, Lynda, M. Corporate Information System Management: Text and Cases, Fourth Edition, Irwin, Inc. Boston, MA. 1996.   Amoroso, Edward, Fundamentals of Computer Security Technology, Prentice-Hall PTR, Uppersaddle River, NJ, 1994.   Behar, Richard, "Who’s Reading Your Email?" Fortune Text Edition, February 3, 1997, http://www.pathfinder.com/@@uxdr5ayaeny7duax/fortune/1997/97020 (July 1, 1997).   Brown, Eryn, "The Myth of Email Privacy", Fortune Text Edition, February 3, 1997, http://www.pathfinder.com/ @@uxdr5ayaeny7duax/fortune/1997/97020 (July 1, 1997). Duganm Joanne, Bechta and Trivedi, Kisitur, S., "Coverage Modeling for Dependability Analysis of Fault-Tolerant Systems", IEEE Transactions on Computers, Vol. 38, No. 6, 1989.   Elgamal, Taher, "Securing Communications on the Intranet and Over the Internet", Netscape Communication Corporation, http://home.netscape.com/newsref/ref/128bit.html (June 30, 1997).   Haimes, Yacov, Y., Risk Modeling, Assessment, and Management, John Wiley and Sons, Inc., New York, 1998.   Hillebrand, Cary, Expert Three, Technical expert specializing in the planning and design of SCADA based and distributed control systems for regional and municipal water distribution networks and water/waste water treatment plants, 1997.   Internet Security Solutions, "The Right Answer-Adaptive Security", ISS White Papers, http://www.iss.net (October 5, 1997).   Kyas, Othmar, Internet Security: Risk Analysis Strategies and Firewalls, International Thompson Publishing, 1997.   Lambert, Robert, "An Interview in Newport News, Va.", President, Automation, Inc., June 12, 1997. (October 10, 1997).   Nelson, Anthony, Expert One, Technical expert for computer fraud tracing and intrusion testing for internet firewalls and mission critical applications like SCADA, 1997.   Nelson, Anthony, Expert One, Personal email on scenario and estimates, 1998.   President’s Commission on Critical Infrastructure Protection (PCCIP), http://www.pccip.gov/summary.html (October 23, 1997).

You May Also Find These Documents Helpful

  • Best Essays

    9/11 Tragedy

    • 383 Words
    • 2 Pages

    * Stanley, S. (2001, ). TruthOrFiction.com-Is that forwarded email Truth or Fiction? Research into stories, scams, hoaxes, myths, and urban legends on the Internet. Search Results. Retrieved March 1, 2013, from http://www.truthorfiction.com/google-result.htm?q=9%2F11…

    • 383 Words
    • 2 Pages
    Best Essays
  • Satisfactory Essays

    IS4799

    • 675 Words
    • 8 Pages

    IS4799 Information Systems and Cybersecurity Capstone Project Unit 2 RFP Bidder’s Conference © ITT Educational Services, Inc. All rights reserved. Learning Objective and Key Concepts…

    • 675 Words
    • 8 Pages
    Satisfactory Essays
  • Good Essays

    References: Kim, D., & Solomon, M. G. (2012). Fundamentals of Information Systems SecuritY. Sudbury: Jones & Bartlett Learning.…

    • 651 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Technical Paper

    • 2659 Words
    • 9 Pages

    Oppliger, R. (1997, May). Internet security: firewalls and beyond. Communication of the ACM Volume 40 Issue 5, pp. 92-100.…

    • 2659 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    NT2580 Introduction to Information Security Unit 2 Application of Security Countermeasures to Mitigate Malicious Attacks © ITT Educational Services, Inc. All rights reserved. Learning Objective Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure. NT2580…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    References: Kim, D., & Solomon, M. (2012). Fundamentals of information systems security. Sudbury, MA: Jones and Bartlett.…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Powerful Essays

    9/11 and Airport Security

    • 3569 Words
    • 15 Pages

    McClure, George. "IEEE-USA Today 's Engineer." 02.12 Ieee-usa Today 's Engineer. 2007. Web. 21 Feb. 2012. http://www.todaysengineer.org/2005/Jun/security.asp…

    • 3569 Words
    • 15 Pages
    Powerful Essays
  • Satisfactory Essays

    Xcom/285 Privacy Laws

    • 321 Words
    • 2 Pages

    Friedman, B., & Reed, L. (2007, June). Workplace privacy: Employee relations and legal implications of monitoring employee e-mail use. Employee Responsibilities and Rights Journal, 19(2),…

    • 321 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The 16 critical infrastructure sectors identified by the Department of Homeland Security (DHS) include; Chemical, Commercial facilities, Communications, Critical manufacturing, Dams, Defense industrial base, Emergency services, Energy, Financial services, Food and agriculture, Government facilities, Health care and public health, Information technology, Nuclear reactors, nuclear materials, and waste, Transportation systems, and Water and wastewater systems. Technological advancement, increasing use of the internet, coupled with the interdependencies of information technology had and continue to have a direct effect on critical infrastructure attacks. These attacks and threats unfortunately have grown and sophisticated level of cyberattacks…

    • 323 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    References: Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: Comp TIA Security + and Beyond (third ed.). Boston, MA: McGraw-Hill Company.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    InsuraCorp Case Study

    • 1220 Words
    • 5 Pages

    InsuraCorp. In C. V. Brown, J. A. Hoffer, & E. M. Wainright, Managing Information Technology (Vol. 7E, pp. 166-169). Pearson.…

    • 1220 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    The growth of e-commerce has been astronomical and its relevance to many businesses c=has increased. According to Forrester, e-commerce in the United States is going to reach $279 billion by 2015 (Indvik, 2011). This includes all electronic financial transactions. A 12.6% increase to $176 billion in 2010 has been fueled by an increase in Internet connected devices such as smartphones, tablets, combined with new e-commerce models—such as NetFlix, Groupon, etc. The consumer appears to be the driving force behind the financial boom of e-commerce.…

    • 6545 Words
    • 27 Pages
    Good Essays
  • Good Essays

    Scada System

    • 1115 Words
    • 5 Pages

    I am going to discuss in brief the SCADA system in GASCO which is one of the biggest MIS in Egypt as it responsible for control natural gas all over Egypt.…

    • 1115 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    References: 1] M.Brinkers, “Why You Should Encrypt Your Email”, djigzo.com, para.3, Jan. 14, 2011. [online]. Available: http://www.djigzo.com/. [Accessed Feb. 22, 2011].…

    • 3611 Words
    • 15 Pages
    Powerful Essays
  • Powerful Essays

    Scada Security

    • 7324 Words
    • 30 Pages

    Abstract – Key management in SCADA (Supervisory Control And Data Acquisition) networks is a major challenge today.…

    • 7324 Words
    • 30 Pages
    Powerful Essays