Write a 2- to 3-page paper (500 to 825 words), double-spaced, in APA format focu
ID: 3912368 • Letter: W
Question
Write a 2- to 3-page paper (500 to 825 words), double-spaced, in APA format focused on designing an ICS/SCADA system, including a network diagram depicting the system components. Identify the major concepts, technologies, components, and security issues related to communications and data networks. Examine the architecture of a particular system and identify significant vulnerabilities, risks, and points at which specific security technologies/methods should be employed. Instructions First, choose an ICS/SCADA system to depict. This may be a real or fictitious system. If it is a real system, please include citations for the organization and system design. Then, present the following sections in your paper: Introduction/System Organization: Describe the organization that owns the system. What is the name of the organization? How large is the organization? Where is the headquarters? Are there additional sites? Components: Explain the components of the system and include the network diagram in this section. Future Challenges: Examine the architecture of this system and identify significant vulnerabilities and risks. Be sure to document what you believe will be difficult to manage in terms of security for this system. [MO1.3, MO1.4, MO1.5] Submit the paper to your mentor for grading. Note: This assignment corresponds to or addresses the following Cybersecurity Program outcomes for a bachelor of science degree: Students apply cybersecurity design best practices and technologies to prevent and mitigate cyberattacks and vulnerabilities. Students design, implement, and administer networks in a secure manner by integrating network defense technologies, monitoring tools, and measures. Your work on this assignment should reflect your ability to: Examine the architecture of a typical, complex system and identify significant vulnerabilities, risks, and points at which specific security technologies/methods should be employed. (System architecture) Describe the fundamental concepts, technologies, components, and security issues related to communications and data networks. (Fundamental concepts, technologies, components, and security issues)
Explanation / Answer
Critical infrastructures, cherish electricity generation plants, transportation systems, oil refineries, chemical factories and producing facilities area unit giant, distributed complexes. Plant operators should endlessly monitor and management many alternative sections of the plant to make sure its correct operation. throughout the last decades this remote command and management has been created possible thanks to the event of networking technology and therefore the advent of business management Systems (ICS). ICS area unit command and management networks and systems designed to support industrial processes. the biggest subgroup of ICS is SCADA (Supervisory management and information Acquisition) systems.
ICS have undergone a major transformation from proprietary, isolated systems to open designs and commonplace technologies extremely interconnected with different company networks and therefore the web. nowadays ICS merchandise area unit largely supported commonplace embedded systems platforms, applied in numerous devices, cherish routers or cable modems, and that they typically use business off-the shelf package. All this has resulted in reduction of prices, easy use and enabled the device and watching from numerous locations. However, a vital disadvantage derived from the affiliation to intranets and communication networks, is that the accrued vulnerability to laptop network-based attacks.
The continuous growth of cyber security threats and attacks as well as the increasing sophistication of malware is impacting the protection of important infrastructure, industrial management systems, and superordinate management and information Acquisition (SCADA) management systems. The reliable operation of recent infrastructures depends on computerised systems and SCADA systems. Since the emergence of web and World Wide internet technologies, these systems were integrated with business systems and have become a lot of exposed to cyber threats. there's a growing concern concerning the protection and safety of the SCADA management systems. The Presidential call Directive sixty three document established the framework to safeguard the important infrastructure and therefore the Presidential document of 2003, the National Strategy to Secure Internet explicit that securing SCADA systems may be a national priority. The important infrastructure includes telecommunication, transportation, energy,banking, finance, water system, emergency services, government services, agriculture, and different elementary systems and services that area unit important to the protection, economic prosperity, and social well-being of the general public. The important infrastructure is characterised by interdependencies (physical,cyber, geographic, and logical) and quality (collections of interacting components).Therefore, data security management principles and processes got to be applied to SCADA systems while not exception. important infrastructure disruptions will directly and indirectly have an effect on different infrastructures, impact giant geographic regions, and send ripples throughout the national and world economy. as an example, below traditional operational conditions, the electrical power infrastructure needs fuels (natural gas and petroleum), transportation, water, banking and finance,telecommunication, and SCADA systems for watching and management.In this paper, we offer associate degree analysis of key developments, architecture, potential vulnerabilities,and security considerations as well as recommendations toward up security for SCADA management systems. we have a tendency to discuss the foremost vital problems regarding the protection of SCADA systems as well as a perspective on enhancing security of those systems. we have a tendency to in brief describe the SCADA design, and determine the attributes that increase the quality of those systems as well as the key developments that mark the evolution of the SCADA management systems in conjunction with the expansion of potential vulnerabilities and security considerations. Then, we offer recommendations toward associate degree increased security for SCADA management systems. a lot of efforts ought to be planned on reducing the vulnerabilities and up the protection operations of those systems. it's necessary to handle not solely the individual vulnerabilities,but the breadth of risks which will interfere with important operations.We describe key necessities and options required to enhance the protection of the present SCADA management systems. as an example, in assessing the danger for SCADA systems, use of general strategies for risk analysis as well as specific conditions and characteristics of an impact system got to be applied. Effective risk analysis for SCADA systems needs a unified definition for mishap and identification of potential damage to safety. As laptop systems area unit a lot of integrated, the excellence between security and safety is getting down to disappear. In bridging the gap between these domains, we have a tendency to propose a unified risk framework which mixes a replacement definition of mishap with associate degree distended definition of hazard to incorporate the protection event.However, strategies for risk management that area unit supported machine-controlled tools and intelligent techniques area unit a lot of helpful to SCADA systems as a result of they need minimum or no human intervention in dominant the processes. we have a tendency to conjointly determine a unified security/safety risk framework for management systems. Implementing security measures ensures higher security, responsibility, and availableness of management systems. therefore organizations got to measure the SCADA management systems and risk model to attain thorough defense solutions for these systems. The increasing threats against SCADA management systems indicate that there ought to be a lot of directions within the development of those systems. Therefore, achieving higher quality and safer SCADA management systems may be a high priority. data security management principles and processes got to be applied to SCADA systems while not exception. we have a tendency to conclude with an inspiration concerning the longer term of SCADA management systems. a method to take care of cyber attacks against the nation’s important infrastructure needs initial understanding the total nature of the threat. A depth defense and proactive solutions to enhance the protection of SCADA management systems ensures the longer term of management systems and survivability of important infrastructure.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.