1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
EastWind [94]
2 years ago
13

Do some Internet research on security vulnerabilities associated with SCADA and digital industrial control systems. Summarize th

e major security concerns associated with these systems and steps than can be taken to enhance their security.
Computers and Technology
1 answer:
Varvara68 [4.7K]2 years ago
7 0

Answer:

Answer explained below

Explanation:

SCADA stands for Supervisor Control and Data Acquisition. It is Industrial control system that uses computers,network devices,graphical user interfaces and other devices such as PLC(Programmable logic controllers) for supervising and controlling industial processes located remotely.

Scada systems are being implemented on a large in various industrial sectors such as petrochemical industries,nuclear power plants,waste water treatment plants,pharmacuetical industries,food and beverage industries etc.

Scada uses various communication and network devices along with various hardware and software components to manage and control the real time processing of the industrial plants.

Although is a very reliable and robust system but its huge network and distributed nature makes it vulnerable to various cyber attacks. The cyber attacks on the Scada system can pose a threat to the industrial and the software environment along with the human race.Since Scada manages many major nuclear plants and petrochemical plants,if anyone hacks into the scada system of these plants it can cause a major threat to complete mankind.

The following are the factors that can cause vulnerabilities in the Scada systems:

The networking of the various enterprise control systems: The remote processing takes place because of the networking of the control systems of the various enterprises.A breach in the security of the enterprise will pose a threat to the working of the control systems.

Insecurity of the remote connections: Scada uses wireless and dial up modems for carrying put the remote activities.If the encryption standards are not followed properly then there can a threat to the information being transferred.

Use of Standard technologies:To ease the working around various platforms and remote locations,the industries have started using standard technologies which means that more number of people are well aware of these technologies and ways to hack them.

Public avalaibility of technical information: The technical information reagarding all the enterprises,their design plans are avalaible to the public on their websites which makes the whole system all the more vulnerable.

How To Avoid Vulnerabilities:

There are standards like ISA99(INdustrial Automation And Control System Security) that offer various strategies and procedures for implementing the security of industrial control systems.

There are government standards and guidelines like NERC-CIP(North American Electrical Reliability Corporation-Critical Infrastructure protection) standard.

Further the industries should good and efficient encryption and authentication techniques for remote communication.

You might be interested in
Environmental technology examples
meriva

Exhaust Gas Recirculation (EGR) for NOx control
<span>Positive Crankcase Ventilation (PCV) for HC emission control </span>
Evaporative Emissions Control(EVAP)
<span>Catalytic Converter for HC and NOx control</span>
6 0
3 years ago
Which is currently the most common cellular network?<br> 4G<br> 4G LTE<br> 5G<br> 5G LTE
Misha Larkins [42]

Answer:

4GLte

Explanation:

8 0
2 years ago
Which format must a document be saved in to share it between two different word processors?. Select one of the options below as
slava [35]
When two different word processors are used to share a document, the word document must be saved in the compatibility format where some of the aspects of one version is retained and reflected in the other version while others cannot be retrieved due to the alteration or absence of a component. 

6 0
2 years ago
What is Microsoft Word an application used for word-processing, an example of?
LuckyWell [14K]

Microsoft word is an example of a graphical word program

7 0
3 years ago
What is the output produced from the following statements? System.out.println("\"Quotes\""); System.out.println("Slashes \\//");
jekas [21]

Answer:

"Quotes"

Slashes \//

How '"confounding' "\" it is!

Explanation:

The question above is testing your knowledge of  the "\" escape sequence, This escape sequence is used to introduce special formatting to the output of the System.out.print function in Java.

It can be used to introduce a new line \n

It can also be used to introduce a tab indentation \t

As in the question above it is used to introduce double quotes "" in this case \"

Also as we see the question above it can still be used to place backlashes to an output in this case we use two backlashes \\. The first is the escape sequence, the second \ gets printed out.

3 0
3 years ago
Other questions:
  • Web definition what means web
    9·1 answer
  • Your friends know that you understand a lot about computers, both the technical details of how they operate as well as informati
    12·1 answer
  • What helped Taylor through her tough time with being bullied
    7·1 answer
  • In which of the following situations may the taxpayer take an education expense on Schedule C? a. Henry, a self-employed adminis
    7·1 answer
  • The requester of sensitive information should not receive access just because of his or her clearance, position, or rank. The re
    15·1 answer
  • Charlie does not think he will be able to finish his project by the deadline at this point in the decision making progress to so
    13·1 answer
  • Convert this hexadecimal number to binary :. A07F​
    14·1 answer
  • Draw the 2-3 tree that results when you insert the keys E A S Y Q U T I O N in that order into an initially empty tree
    12·1 answer
  • Henry is creating code In JavaScript to run calculations on extremely small numbers. How can he use MIN_VALUE as validation in t
    6·1 answer
  • Alayna is researching information online to write her essay about the Berlin Wall.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!