Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Use this link to create a new thread and post your thoughts on the security tech

ID: 3729530 • Letter: U

Question

Use this link to create a new thread and post your thoughts on the security technologies used to secure Industrial Control Systems.
Research and report to the class on one of the following: either (a), (b), or (c). The following security technologies used to secure Industrial Control Systems:

Application Whitelisting, Network segmentation, vulnerability scanning

Network access control, Security Information and Event Management, Data diode

Firewall, IDS, IPS, DPI

Please cover in your post the following points:

Describe what the technology does.

Discuss whether you think it's a good fit for securing ICS and why.

Assignment Resources:

Textbook:

Industrial Network Security, 2nd Edition by: Joel Thomas Langill and Eric D. Knapp- Chapter 10

Explanation / Answer

Answer

given by

Technology Review conversation on Industrial Control Systems security :-

The industrial control systems and other trade systems are using the IT technology extensively. To achieve business goals and to execute fast and produce accurate IT technologies are used. In industrial control system the IT technologies are used for the same idea. But as the skill is used there are some side effects. Along with new amenities the new threats are emerge. In every club the sensitive information and data is manage by automation and IT technologies so it is must to construct them safe and secure. There comes the safety.

Now we talk about about one of the safety practice that is useful and advantageous for today's big business and work systems. We converse about the limitation scan. Weakness is a point or failing of the mechanization scheme from a nasty person or assailant can enter restricted by. By this the assailant can steal the mid in order and change. So it is not first-class for any society. For this we can do exposure examine.

Exposure scan is progression of checking of the likely points as of where attacker can enters the system and exploit on a CPU or set of connections to make out refuge holes. A defenselessness scan detects and classifies system weakness in computer, networks and roads tackle and predicts the success of countermeasures. A inspect may be perform by an organization’s IT sector or a security service provider, possibly as a condition compulsory by some weight. An permitted scan commercial, for example a examine provider that is adept and authorized by the disbursement Card Industry (PCI) to scan payment card networks. disclosure scans are also used by enemy look for point of entry.

There are some tools to be had that perform the fault scanning. A weakness scanner runs from the end point of the person inspect the attack exterior The software measure up to details about the objective attack surface to a folder of in sequence on known security holes in militia and ports, anomalies in sachet construction, and burgeoning paths to exploitable program or scripts. The scanner software attempt to make the most of each publicity that is naked. Running a exposure scan can pose its be in control of risks as it is inherently pushy on the target machine’s running code. As a end result, the scan can cause issues such as mistake and reboots, dipping productivity.

typically the two move in the direction of are used to perform powerlessness scanning -

1) genuine scan - In an authenticated scan, the tester logs in as a complex user, illuminating the vulnerabilities that are reachable to a trusted user, or an interloper that has gained access as a trust customer.

2) Unauthenticated scans - In the unauthenticated method, the tester do the scan as an impostor would, devoid of trust access to the multifaceted. Such a scan reveals vulnerabilities that can be access with no categorization hooked on the set-up.

An ideal nakedness scanner has ability such as the next:

conservation of an up-to-date file of vulnerabilities.

Finding of unadulterated vulnerabilities without an superfluous amount of false positives.

bent to conduct multiple scan all mutually.

Ability to perform trend examination and provide clear rumor of the results.

Recommendation for countermeasures to reduce exposed vulnerabilities.

If defense holes are detect by a helplessness scanner, a weak spot disclosure may be requisite. The organization that discover the openness, or a to blame industry body such as the innermost processing unit Emergency dedication Team (CERT), may make the exposé, occasionally after alert the vendor and allowing them a confident quantity of time to mixture or moderate the crisis.

reimbursement:-

1) Allied remuneration of bulletin Scans -

It is now and again tricky to create a culture of security cbe but creature practical you will see numerous benefits of a previously in a while nakedness scan.

2) Enlarged attentiveness -

One way to augment security awareness at your trade is to raise the specter of appraisal and assessment often. When workers realize their systems will be monitor on an ongoing basis, they will buy-in to sanctuary protocols much quicker.

3) System judgment Results -

A occasionally scan can now and again found unknown problems or issues inside of a security apprehension. Vulnerability scan can often slow down your set-up system.

4) provide Actionable Insight -

A true vulnerability scan can offer insight into your organization that your own IT staff or your IT consulting partner will be able to straight away take action on.

So this Security practice is very helpful to the modern industrial control system to wofk faster with improved defense

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote