Preview

Security Concern In SCADA

Good Essays
Open Document
Open Document
929 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security Concern In SCADA
1.5. Security Concern For any infrastructure or industry the most important part is it's security. Basically the prime target to secure the industry from physical attack. In electric power industry physical attack is shutdown, break down etc. In chemical industry physical attack is leaking of chemical etc. These kind of attacks is known as physical attacks. physical attacks are done by anybody like human error, computer system failure. Second type of attack is cyber attacks. Cyber attacks are done through computer. These kind of attacks are like to use of any industry's controller by third party (hackers). In recent more years, this kind of attacks are growing fast and terrorist groups, frustrated employees, hostile government use this attacks. …show more content…
So this increased connectivity have advantages and also have disadvantages. SCADA works on real time information so it is allow to engineers and production managers to control and monitor the system at every point. If the network is secured, it is hard to monitor for anybody at every network point that's why it uses the unsecured network as well as internet. In which each device send the information to its local or remote controller through internet or its local network. According to this theory, anyone operate this system with full security because the entire system is …show more content…
With this risk factor is being high in SCADA. And for any SCADA system information is like a soul. Each and every functions are depends on information if the information being hacked or corrupt the whole system would be destroyed. A perfect example of public available information is electricity power industry. In electricity power industry open source of information such as product data, maps (showing line connection and interconnections that are currently being used), show the report about Federal Energy Regulatory Commission. All of information are publicly available via internet. Use of ready to action tools and free search tools are reduced the time. These tools to easily expose the identify of SCADA. And increase the risk of attacks. Internet facing systems have identify in some critical industries. In these industries this kind of system exist but few infrastructure has work and trust on local servers. But in internet facing system, these system were designed to allow remote access for monitoring and management. Remote access has configured with internet facing access (no firewall) or weak user name or password are rising the risk. And mostly these kind of information (default information) are available on manufacturer

You May Also Find These Documents Helpful

  • Powerful Essays

    Main Security Concerns: As a rapidly growing business that primarily utilizes IT resources for intranet company communications between and among a single home office and three satellite offices; internal network access controls and remote employee user’s access controls seem to be of primary importance. Priority number one should be hardening and the safeguarding of access and data integrity of the Oracle database servers housed as the main office in Reston, VA. And separately at the San Diego satellite office A comprehensive security policy will be developed and approved by management that will detail the specific guidelines administrators must follow when allowed admin access to company IT resources and services, and when and how those permissions should be denied or allowed. Additionally, auditing and logging of critical events should be implemented utilizing a reliable SEIM (Security Information and Event Management) system. Moreover, control of user access from remote sites via the company intranet via VPN’s and remote access via RADIUS should be strengthened and monitored for both qualitative and quantitate analysis and measuring. Cryptographic techniques will be enhanced and login and password requirements will be strengthened. Of significant importance is the company web presence and corporate access to its knowledge base portal within the company intranet. The company web presence is of vital importance to allow customers to access information concerning the company’s products and services. The knowledge portal is vital for company employees to have access to propriety information while protecting their confidentiality, integrity, and availability of the data. We will separate and hardened both the web server and the knowledge portal via…

    • 2606 Words
    • 11 Pages
    Powerful Essays
  • Best Essays

    Aircraft Solutions Project

    • 2440 Words
    • 10 Pages

    The purpose of the report is to assist Aircraft Solutions (AS) in indentifying the most significant Information Technology (IT) security vulnerabilities. AS products and services are at the forefront of the industry and the protection of such is very important as they are an industry leader. The vulnerabilities that will be discussed are the firewall configuration, virtualization of their hardware assets and defining security policy regarding the timeliness of firewall configuration and updates.…

    • 2440 Words
    • 10 Pages
    Best Essays
  • Satisfactory Essays

    that is used to connect computers and the users. Infrastructure also includes the transmission media such as the lines through telephones television satellites as well as any sort of routers antennas and any other devices that would control the transmission paths. When it comes to managing infrastructures this refers to managing the computing facilities as well as the key elements such as the computer databases the information management systems and the application software. One of the risks in managing the IS would be the globalization issues. Globalization does have its positive side such as opportunities for companies to grow however with that there is also the chance of complex array of operating risks. Without the right infrastructure to conquer these sorts of risks it can lead to company shutdown and no company wants that to happen. Here are a few ways to prevent that from happening.…

    • 774 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Between every network and the outside host of threats there is a first line of defense. For almost every network this will be a firewall. A firewall can be both hardware and software and is usually a combination of the two. A firewall creates a barrier between networks. Any outside computer or client must pass through the firewall to access the network or its resources. Only a computer or system that has proper access can easily access a network protected by a properly configured firewall. Though it is not infallible, a firewall is the first and perhaps best means of security…

    • 855 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Awareness of these kinds of attacks is the key and to be prepared on the part of management and the user. They must be made aware of the consequences of their actions while using the network and accessing the data. The users of the network and system need to be prepared in case of an attack and have knowledge of…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Aircraft Solution’s Commercial Division, connects to the rest of the world via the Internet causing hardware vulnerabilities due to the absence of security and safety that should be implemented, leaving great concern for major security threats. The Commercial Division is only able to access important…

    • 745 Words
    • 3 Pages
    Good Essays
  • Good Essays

    operations in organisations and business environments. Security threats on the remote machines can always be averted easily and their impacts are not as serious compared to threats on the central computer system (Kaufman et al, 2002).The central computer system is a valuable resource that must be secured to ensure continued operation in the organisation. Securing a central computer network is the key to ensuring network security in any institution (Kaeo, 1999).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    When securing the modern enterprise, consider that IT systems do not operate alone. Securing them involves securing their interfaces with other systems as well. It is important to know the different interconnections each system may have.…

    • 312 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    When we ask what “Critical Infrastructure is?” Critical infrastructure is the backbone of our nation’s economy, security, and health. It is clear that we have the power in our homes, the water we drink, the transportation that moves us, and the communication systems we rely on to stay in touch with friends and family. The vitalization of critical infrastructure according to research and the” Department of Homeland Security, 2013” is the assets, systems, and networks, whether physical or virtual. It is so…

    • 1767 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    sec 410

    • 1157 Words
    • 5 Pages

    It is important for all organizations to have physical security. Physical security protects the organization in every way. Every individual needs to be aware of the importance of physical security. Not only is important for the individual to be aware of the importance physical security has in an organization but to be able to understand how physical security works within the organization. In this paper the writer will be describing the core concepts of physical security. Additionally the writer would be writing about the security assessments. Last the writing would be writing about the basic physical controls.…

    • 1157 Words
    • 5 Pages
    Better Essays
  • Better Essays

    The second vulnerability is the policies that are in place to evaluate the firewalls, routers and the personnel to maintain them. There should always be checks and balances with any system. This means you have two sets of personnel maintaining the system. One set of personnel on site, such as a security officer and an assistant security officer to maintain these controls. And the second set being from an outside vendor that would continuously monitor Aircraft Solution’s Systems regularly. This would deter any internal or external malicious attacks to the…

    • 870 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Software systems and centralized databases containing the sensitive of an organization have become the norm in society. Because this information includes the private information of the organization and the consumer, the organization has a responsibility to have the necessary security measures in place to stop attacks as well as have the necessary expertise to provide an effective response in the event of the AIS system failing. The management should be held responsible for ensuring…

    • 851 Words
    • 4 Pages
    Good Essays
  • Good Essays

    In order to produce results, information must be communicated and shared amongst an organization. This information can be shared in various ways such as verbal and technical communications. Information within an organization is used to comprehend the importance of the input and outputs of the business processes in such ways as collaborations of ideas, sharing of concepts, rules, regulations, and business processes. Every organization has data, files, business, and personal records. Organizations have become more reliant on technology. With this reliance comes a sense of dependence on technology for daily business operations, therefore it is very important that organizations protect their information because they can easily be exposed and vulnerable to cyber attacks.…

    • 614 Words
    • 3 Pages
    Good Essays
  • Good Essays

    There are things you need to consider when deciding on what type of system protection you are going to use. The things you need to consider are reliability, selectivity, speed, simplicity, and economics. Reliability consists of assurance that the protection system that is in place will operate correctly. Selectivity consists of ensuring that the amount of the service area disturbed is kept to a minimum. The speed of the system must minimize the duration of the fault and also minimize the amount of damage that may occur to the system. The use of the minimal amount of equipment to achieve the type of protection you want is also important. This will keep things less complicated and also relates to the last thing to consider in a protection system which is cost. You want the maximum amount of protection but at a minimal cost. All of these factors help build a cost effective and reliable protection system that will protect our infrastructure.…

    • 334 Words
    • 2 Pages
    Good Essays