StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

The vulnerabilities of industrial control systems and possible solutions - Essay Example

Cite this document
Summary
Industrial control systems (ICS) are imperative to the quality of life that most of society shares and depends on every day. These systems regulate the electricity, food supply, medical and chemical manufacturing, as well as many other processes and utilities that are used daily…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.9% of users find it useful
The vulnerabilities of industrial control systems and possible solutions
Read Text Preview

Extract of sample "The vulnerabilities of industrial control systems and possible solutions"

Download file to see previous pages

Industrial control systems (ICS) are imperative to the quality of life that most of society shares and depends on every day. These systems regulate the electricity, food supply, medical and chemical manufacturing, as well as many other processes and utilities that are used daily.After September 11, 2001, the threat of terrorist attacks became a high priority on the home front (Marsh 2006). Most people worried about airplanes, metro or subway systems, or bombs, but a few realized that with the computerization of control systems in a variety of industries becoming normal operating procedures, the risk of attack was just as possible as any other probable target.

In fact, some of the systems, such as nuclear plants or chemical manufacturing companies, were more apt to be targeted than others. This concern led to the National Institute of Standards and Technology (NIST) to lead a 500 member forum to discuss cyber-security of the ICS regulating our lives and our country.At the conclusion of this 2004 forum, NIST produced the System Protection Profile-Industrial Control Systems (SPP-ICS) to use as guidelines and strategies to find the vulnerabilities in each facility and possible solutions.

Some of the main concerns include terrorists and unfriendly governments, human error, disgruntled employees, bored teenagers, and natural disasters to name a few. However, most facilities looked only on the outside, without considering errors on the inside that could do as much damage as those external forces. (Barr, 2004; D'Amico, 2004; Marsh, 2006; NIST, 2004; NIST's process control, 2004; Wagman, 2008). NISTS findings were based on the System Target of Evaluation and all risks and vulnerabilities are determined by this standard.

The corporate leaders should look at and consider the vulnerabilities and their solutions to help identify the areas that are in need of immediate attention in their own facilities and to make the cyber-connection of the location secure. Unfortunately some do not believe there is a real threat. For example, Tom Donahue from the CIA stated that "attacks on critical infrastructure lack the necessary dramatic display that seems to be preferred by this constituency" (Marsh, 2006, p. 12). This concept may have been true five years ago, but as the world becomes more connected the disruption of electricity, water, or gas would be a fairly dramatic event for those experiencing it, and for those watching it.

Previously most facilities were separated by using their privately owned machines, hardware and methods of communication. However, with the onset of more facilities and corporations using "commercial, off-the-shelf" products the vulnerability increases (D'Amico, 2004). The SPP-ICS provides three main areas to watch; the type of agent, method of attack, and the asset that will be affected by the attack. The agent is the insider or outsider that either maliciously or accidently causes an attack on the ICS.

The vulnerabilities of attack can include, but are not limited to, protocols, unnecessary systems attached to the ICS, outside remote access to the ICS, incorrect IT architecture, lack of security controls, and lack of risk assessment upon or prior to installation of the system. The assets consist of all the systems used to control the system software and hardware and the infrastructure of the company (Barr, 2004; NIST, 2004) When working to correct or strengthen the security of these systems, the company should look at physical items, the connectivity and if it is secure, authentication, backup and remote access as well as many other attributes of security.

Understanding the

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The vulnerabilities of industrial control systems and possible Essay”, n.d.)
Retrieved from https://studentshare.org/logic-programming/1504844-the-vulnerabilities-of-industrial-control-systems-and-possible-solutions
(The Vulnerabilities of Industrial Control Systems and Possible Essay)
https://studentshare.org/logic-programming/1504844-the-vulnerabilities-of-industrial-control-systems-and-possible-solutions.
“The Vulnerabilities of Industrial Control Systems and Possible Essay”, n.d. https://studentshare.org/logic-programming/1504844-the-vulnerabilities-of-industrial-control-systems-and-possible-solutions.
  • Cited: 0 times

CHECK THESE SAMPLES OF The vulnerabilities of industrial control systems and possible solutions

Measuring Test Quality in Embedded Systems

In the paper “Measuring Test Quality in Embedded systems” the author focuses on embedded systems quality and better measuring methodology.... Modern embedded systems have been included with more line codes compared to what was being witnessed a few years ago.... This situation has called for the development of better testing methods that can be used to overcome the mentioned above setbacks experienced by the traditional embedded systems through offering the exact test quality information even in situations where the measuring and testing processes are carried out when the application under investigation is being run in an embedded target board (Conrad 78)Some malfunction software have been introduced as the quality problem culprit in the products of embedded systems....
14 Pages (3500 words) Research Paper

Cloud Storage as a Means for the US Government to Store Data under Various Security Designations

The possible impacts range from low medium to high which implies minimal damage and inconvenience toe to extreme injury to person and debilitations of the country's economic military and health infrastructures which could have devastating consequences.... Sensitive security information is a category of SBU information and it covers data gathered during security operation that specified government agencies believe should be kept secret since its revelation would result in possible communication and transportation crisis or even security....
14 Pages (3500 words) Case Study

Proposing a Solution

The advent of the security challenges created another aspect of terror, an establishment that many nations are yet to consider as a possible channel for terror attacks.... It incorporates all intentional attacks targeted at… For instance, the cyber attacks directed at the credit transaction service would see the data transactions of the e-commerce system altered into the vast banking systems.... Therefore, it is essential to establish workable approaches to maintaining the security of the communication and technological systems....
6 Pages (1500 words) Essay

Vulnerabilities in the Energy and Financial Sector

Hackers can actually create codes through Stuxnet and then take over the critical systems.... Stuxnet can steal industrial data from supervisory control.... It has the ability to create a worm that enables the attacker full control of the exposed devices.... Siemens AG, the German engineering firm, had detected an attack targeting critical infrastructure, which includes the electric grids, subways, and air-traffic control.... This research study, vulnerabilities in the Energy and Financial Sector, highlights that The U....
13 Pages (3250 words) Research Paper

Key Players and Security Solutions in Smart Grid

The paper "Key Players and Security solutions in Smart Grid" analyses the smart grid as an efficient and modern way of energy transmission,  ensuring the smooth delivery of energy resources at various locations, as well as security threats and the ways to address these security issues.... Additionally, collaborative communication mode is used to make possible the computer processing that has been employed for decades in a number of other sectors.... hellip; Basically the smart grid is a set of technology that people are utilizing to get efficient electricity delivery systems into the current era of technology, by making use of information technology supported remote control and automation....
7 Pages (1750 words) Research Paper

Database Security - Threats and Challenges

However, the situation is not bleak as it is possible to reduce the risks by focusing on the threats that are most critical.... New computing paradigms and applications such as grid based computing and on-demand business are coming up together with security policies such as access control policies that are becoming complex with time (Burtescu 6)....
15 Pages (3750 words) Research Paper

The Challenges in the Internet of Things

Using a document analysis research method, the existing IoT devices have been analyzed with the objective of creating a clear, perceptible depiction of the challenges as well as solutions existing in the IoT today.... Basically, the increasing utilization of IoT systems creates the need for powerful protection against any potential vulnerability or attacks.... The report determines how security challenges in IoT can be managed in the present and future systems....
16 Pages (4000 words) Research Paper

The Technology of Intelligent Building Management Systems

This study aims at introducing the technology of intelligent building management systems and lists as well as critically discuss the security managers' considerations of intelligent building management systems.... This is, however, possible with the use of an intelligent building management system that integrates all the systems together.... … The paper "The Technology of Intelligent Building Management systems" is a delightful example of a term paper on design and technology....
13 Pages (3250 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us