SCADA

Decent Essays
Improved Essays
Superior Essays
Great Essays
Brilliant Essays
    Page 1 of 3 - About 24 Essays
  • Great Essays

    Security Countermeasures

    • 1615 Words
    • 7 Pages

    systems weaknesses 4 distinct areas are identified (López, Setola, & Wolthusen, 2012, p. 216). • SCADA systems weaknesses • Process Network weaknesses • Control Centre weaknesses • Network Layer weaknesses SCADA system weaknesses result from the very nature of the system itself. Because SCADA is software it is inherently open to malicious attempts. There are a multitude of attacks that can be executed on the system that will cause various degrees of damage. For instance, unauthorized command execution, where lack of authentication enables attackers to insert commands into program execution routines sent to all linked systems. Another form of attack can come from SCADA-DOS. Similar to the unauthorized commands attacks the attacker can create Denial-of-Service by forging and sending meaningless SCADA packets resulting in system overload. Consequently, SCADA is networked which can allow for greater access of systems (López, Setola, & Wolthusen, 2012, p. 216-220). Process networks generate another area of concern when assessing security. The process network hosts the SCADA servers, thus it is conceivable that if a person acquired access to a SCADA server the ripple effect could quickly unfold. Unsanctioned entry at this level would enable an attacker to potentially take full control of one or more portions of the entire Power Systems. An OPC DOS can act as a bridge between the SCADA server and the Control Network resulting in a denial of service besides segregating two…

    • 1615 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    especially the energy sector, receives a disproportionate share of attacks [9]. A cyber attack on CI could come from competitors, adversarial states, politically motivated terrorists/hacktivists, or disgruntled insiders. Attacks on CI may use techniques ranging from simple abuse of unprotected systems, to sophisticated exploits such as spear phishing emails (socially engineered tricks to fool users into downloading and or executing malware) as well as unpublished zero-day attacks on…

    • 711 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    concerns associated with SCADA and steps taken to enhance their security SCADA (Supervisory Control and Data Acquisition) is a structure which comprises of both hardware and software components. It is used to control, supervise and interpret an industrial process in real time. In simple terms, SCADA is used to collect information from sensors and instruments positioned at remote sites and broadcast data at a central site either for controlling or supervising reasons. Unlike Industrial Control…

    • 964 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Essay On Zero Day

    • 1430 Words
    • 6 Pages

    exploits employed for economic or military advantage; cyber crime, cyber terrorism and threats to SCADA systems; meta-data collected and used by the private sector and public sector; and vulnerability assessments for mobile devices in the BYOD environment may seem to have little in common. However, each comes with security issues, policy controls to be implemented, and human factors that influence the recommended policies. With so many aspects requiring security, the challenge is to recognize…

    • 1430 Words
    • 6 Pages
    Great Essays
  • Superior Essays

    these echoes to further understand where this crude oil and natural deposits are located. Chevron has immensely used this technology for exploring and finding these deposits. And, over time they have improved this technology to a great extent using proprietary methods that make them find these deposits more accurately than any other competitor in this field. They currently boast an industry-leading discovery rate of 66. (Baggs, 2017) SCADA and digital industrial control systems |…

    • 952 Words
    • 4 Pages
    Superior Essays
  • Great Essays

    Chevron Essay

    • 908 Words
    • 4 Pages

    rate of 66 percent in 2014. This technology allows Chevron scientists to see beneath the earth's surface more clearly and accurately than ever before. Using these proprietary tools, researchers have been able to find significant oil and natural gas reservoirs in increasingly challenging areas, such as beneath thick mountains of salt in the deep-water portion of the U.S. Gulf of Mexico. 2. Do some Internet research on security vulnerabilities associated with SCADA and digital industrial control…

    • 908 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    "Sifers-Grayson" enrolled the services of an information security firm to help it meet the safety and security compliance of the government. The auditing firm’s penetration-testing team (Red Team) conducted a test on the company’s computer systems to determine the effectiveness of security controls measures putting in place by the host company. They were able to able to gain entry in to the company’s R&D servers by exploiting and hacking into an insecure connection points. The Red Team…

    • 504 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Chevron Case Study

    • 789 Words
    • 4 Pages

    Chevron and was cost effective and saved time. Chevron has collaborated with national labs to advance the use of nuclear weapons for seismic technology. CGGVeritas and Schlumberger’s WesternGeco have discovered new techniques for seismic technology and it will increase the productivity of oil industries. 2. Do some Internet research on security vulnerabilities associated with SCADA and digital industrial control systems? Summarize the major security concerns associated with these systems and…

    • 789 Words
    • 4 Pages
    Great Essays
  • Decent Essays

    APT Motivation

    • 373 Words
    • 2 Pages

    To build a stereotype of the APT originator and perpetrator, we need to analyzed the APT motivations. Then, we will analyze their potential victims. Finally use these motivations against the potential victims to describe possible attackers that can use an APT against their victims. APTs share common motivations, but they may have different purposes. The purposes are defined as the tactical advantages they gain to fulfill their objectives. The objectives are defined by the sponsor’s needs for use…

    • 373 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    DNP3 Protocol 3.3

    • 1257 Words
    • 6 Pages

    The Distributed Network Protocol version 3.3 or the DNP 3.3 is a protocol used in the telecommunication between the master station, RTU’s (Remote Telemetry Units) and other Intelligent electronic devices. The DNP 3.0 was introduced to communicate between systems in the electric utility, waste and water, oil and gas and security industries(Clarke, Reynders, & Wright, 2004). Created by Harris controls division for the use in electrical utility industry, the DNP 3.0 was available for the third…

    • 1257 Words
    • 6 Pages
    Great Essays
  • Previous
    Page 1 2 3