Question

In: Computer Science

Supervisory Control and Data Acquisition (SCADA) systems are used to monitor and control industrial processes. In...

Supervisory Control and Data Acquisition (SCADA) systems are used to monitor and control industrial processes. In 2007, it was demonstrated that hackers with access to the SCADA system in a power generation plant could cause an industrial turbine to begin "spinning wildly out of control until it becomes a smoking hulk and power shuts down." (Schneier) Suppose such an attack was launched against a power plant. Which security goal (CIA) does the attack violate? Explain your answer.

Solutions

Expert Solution

Supervisory control and Data Aqusition which is nothing but it is called as SCADA. These systems are used to monitor and control industrial processes.

SCADA systems are highly distributed systems. SCADA systems are used to control geographically dispersed assets, often scattered over thousands of square kilometers. These are centralized data acquisition and control are critical to system operation. These systems are used in distribution systems such as water distribution and wastewater collection systems, oil and gas pipelines, electrical power grids, and railway transportation systems.

A SCADA systems are contains the control center performs centralized monitoring and control for field sites over long-distance communications networks, which includes monitoring alarms and processing status data. Based on information received from remote stations, automated or operator-driven supervisory commands can be pushed to remote station control devices, these are often referred to as field devices. Field devices control local operations such as opening and closing valves and breakers, collecting data from sensor systems, and monitoring the local environment for alarm conditions.

SCADA systems, these are used to control dispersed assets, these are used to control the aquisition.
These systems are used to distribution of systems such as power distribution and water distribution water collection systems, oil and gas pipelines.
There are many other systems like electrical utility transmission and distribution systems.
SCADA systems integrate with the data aqusition systems.These data aqusition systems integrate with the data transimission systems. And the software included in that HMI software.
These SCADA systems are designed to collect field information, transfer it to a central computer facility, and display the information to the operator graphically or textually, thereby allowing the operator to monitor or control an entire system from a central location in real time. Based on the sophistication and setup of the individual system, control of any individual system, operation, or task can be automatic, or it can be performed by operator commands.
The SCADA systems include and consists of both software and hardware.
Typical hardware includes an MTU which was placed in a control center. It contains the graphically distritibuted fields sites consisting of either an RTU or a PLc, which controls actuators and many different typses of sensors.
SCADA systems consists of control center which is used to control the systems present in the SCADA software.
SCADA systems are usually designed to be fault-tolerant systems with significant redundancy built into the system architecture.

Information security is needed to the power generation. To provide the security goal to violate the attack towards the power generation we need some security is to be provided.

Organizations rely heavily on the use of information technology (IT) products and services to run their day-to-day activities. Ensuring the security of these products and services is of the utmost importance for the success of the organization. This publication introduces the information security principles that organizations may leverage to understand the information security needs of their respective systems.

The security goals are of three types. they are:

>confidentiality

>Integrity

>Availability

These three goals are very important for the need of security to be provided.

CIA has nothing to do with a certain well-recognized US intelligence agency. These three letters stand for confidentiality, integrity, and availability, otherwise known as the CIA Triad.

Data alos have been protected by these three factors.

Confidentiality denotes only those who are authorized have access to specific assets and that those who are unauthorized are actively prevented from obtaining access.

The other factor Integrity denotes ensuring that data has not been tampered with and, therefore, can be trusted. It is correct, authentic, and reliable.

The last factor denotes the networks, systems, and applications are up and running. It ensures that authorized users have timely, reliable access to resources when they are needed.

These are the three main factors which are used to provide the isecurity to the information.

Confidentiality is the main security goal which is used to violate the attack to the information which is need to be provided the security.


Related Solutions

True or False: Please explain why A Hotelling's T2 control chart is used to monitor processes...
True or False: Please explain why A Hotelling's T2 control chart is used to monitor processes with short production runs
Honda uses statistical process control to monitor and improve a variety of processes. Employees collect data,...
Honda uses statistical process control to monitor and improve a variety of processes. Employees collect data, and then analyze it using statistical process control charts. They can make adjustments if needed. The statistical process control charts enable workers to understand precisely how processes are working and anticipate problems before they occur. One interesting use is in monitoring the effort required to close a door. Honda monitors the speed of the door required to make it latch by using a special...
Suppose that a control chart is used to monitor ? ̅ where the control limits are...
Suppose that a control chart is used to monitor ? ̅ where the control limits are set to 3?? ̅ and the warning limits are set to 2?? ̅. Answer the following: (a) If the false alarm cost per occurrence is $1000. What is the expected false alarm cost every 100 samples. (b) If the warning inspection cost is $100. What is the expected warning inspection cost every 100 samples. (c) Suppose the current sample size of 10 is quadrupled,...
Solid desiccant air dehumidifier systems are widely used to supply dry air for many industrial processes....
Solid desiccant air dehumidifier systems are widely used to supply dry air for many industrial processes. As humid atmospheric air flows through the system, the water vapor in the air is adsorbed by the desiccant material, resulting in dry air leaving the system. Inlet air velocity and tekperature are observed as predominant parameters that influence the outlet conditions of the air. Consider a cylindrical air channel with a length of 1 meter and an inner diameter of 20 mm, as...
A control chart is used for a painting process to monitor the surface imperfections of a...
A control chart is used for a painting process to monitor the surface imperfections of a metal toaster oven cover. The inspection is on a random sampling basis with 10 covers forming a subgroup. The most recent 20 subgroups contained 180 imperfections. Please determine the control limits for the appropriate chart.
Is "internal control" the only organisational policy and procedures can be used to reconcile and monitor...
Is "internal control" the only organisational policy and procedures can be used to reconcile and monitor the financial accounts? If it is please explain? OR if there is others type of policy and procedures can be used to reconcile and monitor the financial accounts, list them and explain why and how? (Consider it's Australian accounting environment) (Please type up your answer)
List at least five (5) operational guidelines that are used to monitor and control an activated...
List at least five (5) operational guidelines that are used to monitor and control an activated sludge system, and the typical range of each guideline in a healthy system
Explain the function of various parts of a data acquisition system. What are the industrial applications...
Explain the function of various parts of a data acquisition system. What are the industrial applications of PC-based data acquisition system? and how it assists in calibration and testing of measurement sensors?
Aluminum chloride, AlCl3, is an inexpensive reagent used in many industrial processes. It is made by...
Aluminum chloride, AlCl3, is an inexpensive reagent used in many industrial processes. It is made by treating scrap aluminum with chlorine gas according to the following balanced chemical equations: 2 Al (s) + 3 Cl2 (g) = 2 AlCl (s) If you start with 5.60 g of Al and 3.25 g of Cl2, how much aluminum chloride should be formed? What is the limiting reactant in this situation?
The most common processes used in the treatment of domestic and industrial wastewater are carbon removal,...
The most common processes used in the treatment of domestic and industrial wastewater are carbon removal, nitrification, denitrification and methanogenesis processes. 1- Describe in detail how wastewater is treated in these processes. Classify the microorganisms involved in these processes by metabolic groups, carbon source, energy source, electron donor source and electron acceptors. 2- Provide information on the characteristics of the wastewater originating from these industries by giving at least three examples to the industrial wastewater sources where each process is...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT