Question

In: Computer Science

Four Full pages double spaced on What are ICS and SCADA systems? Historical instances of attacks...

Four Full pages double spaced on What are ICS and SCADA systems? Historical instances of attacks on industrial control systems.
Recent attacks on ICS: What vulnerabilities were exploited? What types of IT systems were compromised? What technical controls can be implemented to prevent attacks? Protecting ICS systems: What controls can be implemented to prevent attacks? Are there any published standards for protecting ICS? All the work should be cited.

Solutions

Expert Solution

What is ICS and SCADA system:

  • ICS and SCADA frameworks are all over the place. These gadgets give the capacity to robotize authority over things like the temperature of a place of business, or the time that lights should turn on consequently.
  • ICS and SCADA gadgets additionally assume a significant part in the computerization and control of basic foundations like force, water, and gas. These frameworks frequently have restricted capacities in refreshing the product because of the potential effect it could have on framework work.
  • This presents a particular test from the network protection viewpoint. Huge numbers of the operational innovation (OT) frameworks interface with a control PC that might be running an out of date working framework.

Vulnerabilities which are exploited are:

STUXNET Vulnerability:(One of the example )

What made Stuxnet so perilous was that it self-recreated and spread all through numerous frameworks using different methods, for example,

• Removable drives misusing a weakness permitting auto-execution.

• Local zone organizations (LANs) abusing a weakness in the Windows Print Spooler.

• Server Message Block (SMB) utilized for giving shared admittance to records, printers, and different gadgets by misusing a weakness in the Microsoft Windows Server Service.

• Network record sharing by duplicating and executing itself.

•Siemens WinCC HMI information base worker by replicating and executing itself.

• Siemens Step 7 by replicating itself into Step 7 activities in such a way that it is consequently executed when Step 7 undertaking is stacked.

Platform Hardware Vulnerabilities

  • Inadequate testing of security changes lacks redundancy for critical components.
  • Unsecure remote access to ICS components.
  • Lack of backup power from generators or Uninterruptible Power Supply (UPS).
  • Dual network interface cards to connect networks.
  • Inadequate physical protection of critical systems.
  • Undocumented assets are connected to the ICS network. Unauthorized personnel has physical access to equipment.
  • Loss of environmental control could lead to overheating of a hardwareRadiofrequency and electromagnetic pulses (EMP) caused disruptions and damage to circuitry

IT systems were compromised of :

• Passwords treat and program history by infusing their modules into various programs to capture client meetings.

• Computer network associations.

• Processes and organizers.

• BIOS and CMOS RAM subtleties.

• Local, organization, and removable drive data.

Controls that can be implemented to protect from attack:

  • ICS keeps on modernizing, an expanding number of Internet of Things (IoT) gadgets are acquainted with improve profitability and upgrade framework control. With the utilization of related IoT gadgets; measure controls, information checking, and correspondence with different frameworks are made less difficult. Be that as it may, there are chances included when shrewd gadgets are utilized for such assignments.

  • IoT fuses AI and large information investigation. It likewise bridles sensor information, machine-to-machine (M2M) correspondence, and mechanization innovations that have recently existed in the modern setting.
  • IoT can perform assignments, for example, information conglomeration, prescient investigation, prescriptive examination, information esteem expansion, and even the production of new business models.
  • Like how the presentation of PDAs was trailed by the ascent of weaknesses and malware identified with the stage, coordinating Human Internet of Things (IoT) and IoT gadgets may make comparative issues. Truth be told, overseeing IoT gadgets in the ICS climate can make significant difficulties in security, as every gadget should be appropriately safeguarded and made sure about. Not having any significant bearing sufficient security leaves the whole ICS biological system profoundly helpless against assaults.

Yes, there are proper standards for protecting ICS Security Related Standards, Guidelines, and Policy Documents. Addition III of the report "Securing Industrial Control Systems".


Related Solutions

What are the four major components of a SCADA/ICS System? Draw a simple graphic to describe...
What are the four major components of a SCADA/ICS System? Draw a simple graphic to describe their relationship (e.g. flow chart)
What communication advances have led Cybersecurity to be a greater concern to modern SCADA/ICS systems? Explain...
What communication advances have led Cybersecurity to be a greater concern to modern SCADA/ICS systems? Explain your answer.
Remember to write a full 2 pages, double spaced. Use course/text vocabulary to discuss the following:...
Remember to write a full 2 pages, double spaced. Use course/text vocabulary to discuss the following: Page 1: How has culture (think more than just ethnicity, race, nationality - although you can include those) impacted your identity? examples: Seattle/Pacific Northwest culture, workplace cultures, groups you belong to (Sea hawks fan) Page 2. How has your cultural perceptions impacted a relationship (pick one relationship of your choice to focus on)?
I need to write four pages double spaced paper on a wealth inequality in USA. I...
I need to write four pages double spaced paper on a wealth inequality in USA. I can use three sources for my paper. Can someone help me please.
In two full pages (double spaced) of writing (500-600 words), one page for each city (Oakland...
In two full pages (double spaced) of writing (500-600 words), one page for each city (Oakland & Detroit) - Describe an example from the video of a Social Determinant of Health, state which of the 5 categories it belongs to and how it is related to the health of the community. Discuss the efforts are being made promote health using the framework of the SDOH. Compare and contrast your neighborhood to the city. Discuss similarities and differences
Paper should be about 10 double-spaced, type-written pages or the number of pages to fully explore...
Paper should be about 10 double-spaced, type-written pages or the number of pages to fully explore the topic. The paper should include no less than 4 academic sources. Write an essay on one of the following: 1. Describe the impact of "shifting services” on marking channels. 2. Describe the impact of "online channels” on marketing channels. 3. Describe the impact of "globalization” on marketing channels. 4. Explain how the design and management of marketing channels fit into the marketing mix...
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the...
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of Application security have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
Chapter 17: In 500 words, or 2 pages double-spaced, Discuss preferred stock.
Chapter 17: In 500 words, or 2 pages double-spaced, Discuss preferred stock.
In 500 words, or 2 pages double-spaced, Discuss the advantages and disadvantages of corporate debt.
In 500 words, or 2 pages double-spaced, Discuss the advantages and disadvantages of corporate debt.
Your reading response must be two pages typed and double spaced, and include a bibliography to...
Your reading response must be two pages typed and double spaced, and include a bibliography to support your documentation on any topic related to the environmental crisis & infectious disease.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT