SCADA

    Page 1 of 2 - About 18 Essays
  • Security Countermeasures

    systems weaknesses 4 distinct areas are identified (López, Setola, & Wolthusen, 2012, p. 216). • SCADA systems weaknesses • Process Network weaknesses • Control Centre weaknesses • Network Layer weaknesses SCADA system weaknesses result from the very nature of the system itself. Because SCADA is software it is inherently open to malicious attempts. There are a multitude of attacks that can be executed on the system that will cause various degrees of damage. For instance, unauthorized command execution, where lack of authentication enables attackers to insert commands into program execution routines sent to all linked systems. Another form of attack can come from SCADA-DOS. Similar to the unauthorized commands attacks the attacker can create Denial-of-Service by forging and sending meaningless SCADA packets resulting in system overload. Consequently, SCADA is networked which can allow for greater access of systems (López, Setola, & Wolthusen, 2012, p. 216-220). Process networks generate another area of concern when assessing security. The process network hosts the SCADA servers, thus it is conceivable that if a person acquired access to a SCADA server the ripple effect could quickly unfold. Unsanctioned entry at this level would enable an attacker to potentially take full control of one or more portions of the entire Power Systems. An OPC DOS can act as a bridge between the SCADA server and the Control Network resulting in a denial of service besides segregating two…

    Words: 1615 - Pages: 7
  • Cyber Security In Canada Essay

    especially the energy sector, receives a disproportionate share of attacks [9]. A cyber attack on CI could come from competitors, adversarial states, politically motivated terrorists/hacktivists, or disgruntled insiders. Attacks on CI may use techniques ranging from simple abuse of unprotected systems, to sophisticated exploits such as spear phishing emails (socially engineered tricks to fool users into downloading and or executing malware) as well as unpublished zero-day attacks on…

    Words: 711 - Pages: 3
  • Essay On Zero Day

    exploits employed for economic or military advantage; cyber crime, cyber terrorism and threats to SCADA systems; meta-data collected and used by the private sector and public sector; and vulnerability assessments for mobile devices in the BYOD environment may seem to have little in common. However, each comes with security issues, policy controls to be implemented, and human factors that influence the recommended policies. With so many aspects requiring security, the challenge is to recognize…

    Words: 1430 - Pages: 6
  • Seismic Imaging Technology And Chevron Case Study

    concerns associated with SCADA and steps taken to enhance their security SCADA (Supervisory Control and Data Acquisition) is a structure which comprises of both hardware and software components. It is used to control, supervise and interpret an industrial process in real time. In simple terms, SCADA is used to collect information from sensors and instruments positioned at remote sites and broadcast data at a central site either for controlling or supervising reasons. Unlike Industrial Control…

    Words: 964 - Pages: 4
  • Pros And Cons Of Seismic Imaging Technology: Evolution And Development

    these echoes to further understand where this crude oil and natural deposits are located. Chevron has immensely used this technology for exploring and finding these deposits. And, over time they have improved this technology to a great extent using proprietary methods that make them find these deposits more accurately than any other competitor in this field. They currently boast an industry-leading discovery rate of 66. (Baggs, 2017) SCADA and digital industrial control systems |…

    Words: 952 - Pages: 4
  • Chevron Case Study

    Chevron and was cost effective and saved time. Chevron has collaborated with national labs to advance the use of nuclear weapons for seismic technology. CGGVeritas and Schlumberger’s WesternGeco have discovered new techniques for seismic technology and it will increase the productivity of oil industries. 2. Do some Internet research on security vulnerabilities associated with SCADA and digital industrial control systems? Summarize the major security concerns associated with these systems and…

    Words: 789 - Pages: 4
  • DNP3 Protocol 3.3

    The Distributed Network Protocol version 3.3 or the DNP 3.3 is a protocol used in the telecommunication between the master station, RTU’s (Remote Telemetry Units) and other Intelligent electronic devices. The DNP 3.0 was introduced to communicate between systems in the electric utility, waste and water, oil and gas and security industries(Clarke, Reynders, & Wright, 2004). Created by Harris controls division for the use in electrical utility industry, the DNP 3.0 was available for the third…

    Words: 1257 - Pages: 6
  • Solar Panels Are The Future Of Energy

    current, which converts the AC electricity produced by absorbing the sun’s rays and turns it into a commonly used current that can power a customers home known as DC current. The three most important features of modern solar panels working in unison are the Smart Inverter, the Tracking, Monitoring, and control system and the SCADA system. The Smart Inverter monitors the power being produced by the solar panels, while the Tracking, Monitoring, and Control system uses that information, changing…

    Words: 1007 - Pages: 5
  • Conficker Virus: A Case Study

    hacking IMDs include the desire to harm either a specific person or just someone in general”. Also, the Conficker virus may assist hackers to perform fraudulent and theft acts by purloining financial data and other vital information from banks, the stock market or hospital records (Burton, 2015; Weinberger, 2012). Next, both Admiral Mike McConnell and General Staff, Alexander Burutin, were disturbed about warfare and cyberattacks and their effects on the military control system, navigation and…

    Words: 707 - Pages: 3
  • Black Ice Summary

    critical infrastructure by providing relevant, timely, and appropriate information to the national centers. This function shall also use information and intelligence provided by other critical infrastructure partners, including SLTT and nongovernmental analytic entities. Critical infrastructure sites are increasingly vulnerable to cyberattack as the systems that run them become more accessible, interconnected, and reliant on cyberspace. The risks posed to Industrial Control System and…

    Words: 823 - Pages: 4
  • Previous
    Page 1 2

Related Topics:

Popular Topics: