1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
EastWind [94]
3 years ago
13

Do some Internet research on security vulnerabilities associated with SCADA and digital industrial control systems. Summarize th

e major security concerns associated with these systems and steps than can be taken to enhance their security.
Computers and Technology
1 answer:
Varvara68 [4.7K]3 years ago
7 0

Answer:

Answer explained below

Explanation:

SCADA stands for Supervisor Control and Data Acquisition. It is Industrial control system that uses computers,network devices,graphical user interfaces and other devices such as PLC(Programmable logic controllers) for supervising and controlling industial processes located remotely.

Scada systems are being implemented on a large in various industrial sectors such as petrochemical industries,nuclear power plants,waste water treatment plants,pharmacuetical industries,food and beverage industries etc.

Scada uses various communication and network devices along with various hardware and software components to manage and control the real time processing of the industrial plants.

Although is a very reliable and robust system but its huge network and distributed nature makes it vulnerable to various cyber attacks. The cyber attacks on the Scada system can pose a threat to the industrial and the software environment along with the human race.Since Scada manages many major nuclear plants and petrochemical plants,if anyone hacks into the scada system of these plants it can cause a major threat to complete mankind.

The following are the factors that can cause vulnerabilities in the Scada systems:

The networking of the various enterprise control systems: The remote processing takes place because of the networking of the control systems of the various enterprises.A breach in the security of the enterprise will pose a threat to the working of the control systems.

Insecurity of the remote connections: Scada uses wireless and dial up modems for carrying put the remote activities.If the encryption standards are not followed properly then there can a threat to the information being transferred.

Use of Standard technologies:To ease the working around various platforms and remote locations,the industries have started using standard technologies which means that more number of people are well aware of these technologies and ways to hack them.

Public avalaibility of technical information: The technical information reagarding all the enterprises,their design plans are avalaible to the public on their websites which makes the whole system all the more vulnerable.

How To Avoid Vulnerabilities:

There are standards like ISA99(INdustrial Automation And Control System Security) that offer various strategies and procedures for implementing the security of industrial control systems.

There are government standards and guidelines like NERC-CIP(North American Electrical Reliability Corporation-Critical Infrastructure protection) standard.

Further the industries should good and efficient encryption and authentication techniques for remote communication.

You might be interested in
To discover how many cells in a range contain values that meet a single criterion, use the ___ function
alexandr402 [8]

Answer:

COUNTIF

Explanation:

the Countif function counts the number of cells in range that meets a given criteria.

6 0
3 years ago
Which device on a network performs network address translation?
Alika [10]
Network Address Translation<span> (NAT) is the answer</span>
4 0
3 years ago
Declaring a variable in the method’s body with the same name as a parameter variable in the method header is ___________.
icang [17]

Answer:

a. a syntax error

Explanation:

When the same variable name is repeated in the parameter set and the method body, it will result in a syntax error. This is because the variable in the parameter has a local scope within the method body. Now if we declare another variable with the same name in the method body, it will result in redefinition of the variable and violate the uniqueness principle of variable names in the method code. This will give rise to syntax error.

8 0
3 years ago
Which file extension takes less storage space?
anyanavicka [17]

I believe the answer would be the JPEG file extension.

4 0
3 years ago
Read 2 more answers
Which file format produces a lock-down version of an access database? accdb accdb-be accde accdb-e
jek_recluse [69]

The file format that produces a lock-down version of an access database is called; ACCDE

<h3>How to Identify Access Database?</h3>

ACCDB files are the default Microsoft Access database format in Access 2007 and later versions while the ACCDE format is a read-only, compressed version.

Now, the file format that produces a lock down version of an access database is called ACCDE file which is a Microsoft Access Execute Only Database file used to protect an ACCDB file.

Read more about Access Database at; brainly.com/question/9745438

#SPJ1

8 0
2 years ago
Other questions:
  • In the movie evacuees, why were the children evacuated from large cities?
    11·1 answer
  • A user has been given Full Control permission to a shared folder. The user has been given Modify permission at the NTFS level to
    11·1 answer
  • Mr. Green maintains a spreadsheet containing data on all of his employees, including name, job profile, monthly salary, and home
    15·1 answer
  • As you type your outline, click Demote to move a line of text
    13·2 answers
  • Similarities between inline css and internal css​
    6·1 answer
  • We can use formatting before and after typing.​
    8·1 answer
  • To simplify the conceptual design, most higher-order relationships are decomposed into appropriate equivalent _____ relationship
    11·1 answer
  • Functionality testing is primarily used with ____________. firewall protection software development hardening servers server tes
    8·1 answer
  • Why is it important to continiously conduct penetration testing for a strong security system?.
    15·1 answer
  • Describe the method used by operating systems to differentiate between TCP connections.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!