1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
EastWind [94]
3 years ago
13

Do some Internet research on security vulnerabilities associated with SCADA and digital industrial control systems. Summarize th

e major security concerns associated with these systems and steps than can be taken to enhance their security.
Computers and Technology
1 answer:
Varvara68 [4.7K]3 years ago
7 0

Answer:

Answer explained below

Explanation:

SCADA stands for Supervisor Control and Data Acquisition. It is Industrial control system that uses computers,network devices,graphical user interfaces and other devices such as PLC(Programmable logic controllers) for supervising and controlling industial processes located remotely.

Scada systems are being implemented on a large in various industrial sectors such as petrochemical industries,nuclear power plants,waste water treatment plants,pharmacuetical industries,food and beverage industries etc.

Scada uses various communication and network devices along with various hardware and software components to manage and control the real time processing of the industrial plants.

Although is a very reliable and robust system but its huge network and distributed nature makes it vulnerable to various cyber attacks. The cyber attacks on the Scada system can pose a threat to the industrial and the software environment along with the human race.Since Scada manages many major nuclear plants and petrochemical plants,if anyone hacks into the scada system of these plants it can cause a major threat to complete mankind.

The following are the factors that can cause vulnerabilities in the Scada systems:

The networking of the various enterprise control systems: The remote processing takes place because of the networking of the control systems of the various enterprises.A breach in the security of the enterprise will pose a threat to the working of the control systems.

Insecurity of the remote connections: Scada uses wireless and dial up modems for carrying put the remote activities.If the encryption standards are not followed properly then there can a threat to the information being transferred.

Use of Standard technologies:To ease the working around various platforms and remote locations,the industries have started using standard technologies which means that more number of people are well aware of these technologies and ways to hack them.

Public avalaibility of technical information: The technical information reagarding all the enterprises,their design plans are avalaible to the public on their websites which makes the whole system all the more vulnerable.

How To Avoid Vulnerabilities:

There are standards like ISA99(INdustrial Automation And Control System Security) that offer various strategies and procedures for implementing the security of industrial control systems.

There are government standards and guidelines like NERC-CIP(North American Electrical Reliability Corporation-Critical Infrastructure protection) standard.

Further the industries should good and efficient encryption and authentication techniques for remote communication.

You might be interested in
What two names are given to the blinking vertical line?
Paha777 [63]

Answer:

<u>see </u><u>below</u><u>:</u>

Explanation:

One is (the cursor).

Whenever you see a flashing vertical line called-the cursor--you can start typing.Note that the mouse pointer is also called a cursor,but it is shaped differently.The keyboard cursor is also called the insertion point.

5 0
3 years ago
You can access various sites on WWW by using hyperlinks or by?
wlad13 [49]
You can access various sites on WWW by using hyperlinks or by?

Answer is: A following directions on-screen
5 0
3 years ago
Read 2 more answers
What is the main goal of computer generated by digitalization
mars1129 [50]

Answer:

for better future and attractive human life

4 0
4 years ago
In computer science, what does the word security mean?
zepelin [54]

Answer:

B

Explanation:

Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.[1]

4 0
3 years ago
You receive a phone call from a co-worker telling you that "the network is down." Just as you are about to look into the issue,
Dvinal [7]

This issue will happen mostly if cellular network will not be down, or suppose if cellular network is down mostly, or it will be rainy or a current cutoff issue might be occurred.

<u>Explanation:</u>

The following step to be made for trouble shoot his phone when cellular network is down.

1. Restart the mobile:- After restarting kindly check mobile connectivity.

2. Check for mobile air plane mobile and make sure the mobile phone is not in air plane mode.

3. Check the income and outgoing vapidity.

4. Switch off the mobile, Remove service provider sim card from mobile and reinsert the sim card and start the mobile.

5. Still connectivity problem, either contact the service provider or replace with new sim card.

5 0
3 years ago
Other questions:
  • For electronically deposited funds, such as an employee's direct deposit, when must banks make those funds available to the empl
    8·1 answer
  • Marty uses a customized database to sort parts and track inventory. The customized database is an example of _____.
    15·1 answer
  • Possible consequences for plagiarism, listed in CAVA's Academic Integrity Policy, may include:
    9·1 answer
  • What is one way you can learn about your digital footprint?
    13·1 answer
  • BRAINLIEST !!A game design document is like a diary for game developers.
    11·1 answer
  • One key criterion for selecting social networks is the number of daily visitors to the website. when comparing linkedin traffic
    7·1 answer
  • NEED FIVE QUESTIONS ANSWERED!!!
    7·1 answer
  • Please answer me fast ​
    6·2 answers
  • Whats 12/29 divided by 12/34
    7·2 answers
  • Heeeeeeeeeeeeeeeeeeeeeeeeelp pat.2
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!