1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
EastWind [94]
2 years ago
13

Do some Internet research on security vulnerabilities associated with SCADA and digital industrial control systems. Summarize th

e major security concerns associated with these systems and steps than can be taken to enhance their security.
Computers and Technology
1 answer:
Varvara68 [4.7K]2 years ago
7 0

Answer:

Answer explained below

Explanation:

SCADA stands for Supervisor Control and Data Acquisition. It is Industrial control system that uses computers,network devices,graphical user interfaces and other devices such as PLC(Programmable logic controllers) for supervising and controlling industial processes located remotely.

Scada systems are being implemented on a large in various industrial sectors such as petrochemical industries,nuclear power plants,waste water treatment plants,pharmacuetical industries,food and beverage industries etc.

Scada uses various communication and network devices along with various hardware and software components to manage and control the real time processing of the industrial plants.

Although is a very reliable and robust system but its huge network and distributed nature makes it vulnerable to various cyber attacks. The cyber attacks on the Scada system can pose a threat to the industrial and the software environment along with the human race.Since Scada manages many major nuclear plants and petrochemical plants,if anyone hacks into the scada system of these plants it can cause a major threat to complete mankind.

The following are the factors that can cause vulnerabilities in the Scada systems:

The networking of the various enterprise control systems: The remote processing takes place because of the networking of the control systems of the various enterprises.A breach in the security of the enterprise will pose a threat to the working of the control systems.

Insecurity of the remote connections: Scada uses wireless and dial up modems for carrying put the remote activities.If the encryption standards are not followed properly then there can a threat to the information being transferred.

Use of Standard technologies:To ease the working around various platforms and remote locations,the industries have started using standard technologies which means that more number of people are well aware of these technologies and ways to hack them.

Public avalaibility of technical information: The technical information reagarding all the enterprises,their design plans are avalaible to the public on their websites which makes the whole system all the more vulnerable.

How To Avoid Vulnerabilities:

There are standards like ISA99(INdustrial Automation And Control System Security) that offer various strategies and procedures for implementing the security of industrial control systems.

There are government standards and guidelines like NERC-CIP(North American Electrical Reliability Corporation-Critical Infrastructure protection) standard.

Further the industries should good and efficient encryption and authentication techniques for remote communication.

You might be interested in
Host to IP address lookup and its reverse lookup option are very important network services for any size network. It is also how
Serhud [2]

Answer:

Domain Name System Security Extensions (DNSSEC)

Explanation:

3 0
3 years ago
TIFF is the default file format for most digital cameras. State True or False.
Gala2k [10]
That statement is false

Without any editing, the default file format for most digital cameras that currently exist in the market is JPG

hope this helps
3 0
3 years ago
Describe a situation where it would be advantageous to use the copper tape or aluminum foil instead of the A and B push buttons
umka2103 [35]

Answer:

A situation where it would be advantageous to use the copper tape/aluminum foil instead of the A + B buttons on a micro:bit is when

Explanation:

8 0
3 years ago
Read 2 more answers
Microsoft Access is a
AnnyKZ [126]
Microsoft Access is a database management system from Microsoft that combines the relational Microsoft Jet Database Engine with a graphical user interface and software-development tools.
4 0
3 years ago
Which result would support the particle theory of light?
andriy [413]

This question is related to the emission of electrons when light shines on an metal. (Photoelectric effect)

With the classical theory, it was thought that increasing or decreasing the intensity of light would increase or decrease the kinetic energy of the electron.,

Another expected result was that time gap between when light strikes the metal and when electrons are ejected, would depend on the intensity of such light.

However, the experimental results were not consistent with the particle theory of light. So your answer is A. 

Later on this effect was correctly explained by Einstein based on Planck's findings.


8 0
3 years ago
Read 2 more answers
Other questions:
  • What type of data visual would you use to illustrate trends over time? Gantt chart Bar graph Line chart Scatter diagrams
    5·1 answer
  • So when i try to click on an assignment to answer it the ask a question thing pops up and i can't exit out of it. I've tried rel
    10·2 answers
  • the piece of hardware that contains the circuitry that processes the information coming in to the computer
    13·1 answer
  • Which of the following is NOT a component of a DFD?
    8·1 answer
  • Which would be a responsible use of technology used by victims of cyberbullying?
    12·2 answers
  • How much a T-mobile plan cost​
    11·2 answers
  • What is a Slide Master? A. the placeholder used to insert objects B. the sequence of slides in a presentation C. the default des
    14·1 answer
  • Write a program that has an array of at least 50 string objects that hold people’s names and phone numbers. The program then rea
    12·1 answer
  • How does the Problem-solving Process help us to solve everyday Problems?
    13·1 answer
  • Typically, hybrid drives use SSD to store the operating system and applications and hard disks to store videos, music, and docum
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!