Industrial control systems (ICS) are imperative to the quality of life that most of society shares and depends on every day. These systems regulate the electricity, food supply, medical and chemical manufacturing, as well as many other processes and utilities that are used daily…
Download file to see previous pages...
Industrial control systems (ICS) are imperative to the quality of life that most of society shares and depends on every day. These systems regulate the electricity, food supply, medical and chemical manufacturing, as well as many other processes and utilities that are used daily.After September 11, 2001, the threat of terrorist attacks became a high priority on the home front (Marsh 2006). Most people worried about airplanes, metro or subway systems, or bombs, but a few realized that with the computerization of control systems in a variety of industries becoming normal operating procedures, the risk of attack was just as possible as any other probable target. In fact, some of the systems, such as nuclear plants or chemical manufacturing companies, were more apt to be targeted than others. This concern led to the National Institute of Standards and Technology (NIST) to lead a 500 member forum to discuss cyber-security of the ICS regulating our lives and our country.At the conclusion of this 2004 forum, NIST produced the System Protection Profile-Industrial Control Systems (SPP-ICS) to use as guidelines and strategies to find the vulnerabilities in each facility and possible solutions. Some of the main concerns include terrorists and unfriendly governments, human error, disgruntled employees, bored teenagers, and natural disasters to name a few. However, most facilities looked only on the outside, without considering errors on the inside that could do as much damage as those external forces. (Barr, 2004; D'Amico, 2004; Marsh, 2006; NIST, 2004; NIST's process control, 2004; Wagman, 2008).
NISTS findings were based on the System Target of Evaluation and all risks and vulnerabilities are determined by this standard. The corporate leaders should look at and consider the vulnerabilities and their solutions to help identify the areas that are in need of immediate attention in their own facilities and to make the cyber-connection of the location secure. Unfortunately some do not believe there is a real threat. For example, Tom Donahue from the CIA stated that "attacks on critical infrastructure lack the necessary dramatic display that seems to be preferred by this constituency" (Marsh, 2006, p. 12). This concept may have been true five years ago, but as the world becomes more connected the disruption of electricity, water, or gas would be a fairly dramatic event for those experiencing it, and for those watching it.
Previously most facilities were separated by using their privately owned machines, hardware and methods of communication. However, with the onset of more facilities and corporations using "commercial, off-the-shelf" products the vulnerability increases (D'Amico, 2004).
The SPP-ICS provides three main areas to watch; the type of agent, method of attack, and the asset that will be affected by the attack. The agent is the insider or outsider that either maliciously or accidently causes an attack on the ICS. The vulnerabilities of attack can include, but are not limited to, protocols, unnecessary systems attached to the ICS, outside remote access to the ICS, incorrect IT architecture, lack of security controls, and lack of risk assessment upon or prior to installation of the system. The assets consist of all the systems used to control the system software and hardware and the infrastructure of the company (Barr, 2004; NIST, 2004)
When working to correct or strengthen the security of these systems, the company should look at physical items, the connectivity and if it is secure, authentication, backup and remote access as well as many other attributes of security. Understanding the
...Download file to see next pagesRead More
Cite this document
(“The vulnerabilities of industrial control systems and possible Essay”, n.d.)
Retrieved from https://studentshare.org/logic-programming/1504844-the-vulnerabilities-of-industrial-control-systems-and-possible-solutions
(The Vulnerabilities of Industrial Control Systems and Possible Essay)
“The Vulnerabilities of Industrial Control Systems and Possible Essay”, n.d. https://studentshare.org/logic-programming/1504844-the-vulnerabilities-of-industrial-control-systems-and-possible-solutions.
The purpose of this paper is to explore the causes of the financial crisis and ways in which future crises will be reduced, as well as whether the banks would rather separate or consolidate. The 2007 crisis had impacts on the banking sectors, the central banks of different countries were attempted to instill the remedy in the appalling situation so that sanity in the banking sector can be restored.
Crossen (1996) identifies three conflicts of interest which are recurrent in research. The interests are the sponsor’s, the media’s and the researcher’s (p. 20). It may not be wrong to assume that long gone are the days when the results of researches can be thought of as true and factual.
This COCO method is thought to be more concrete and user friendly method of Internal accounting control system. The concept of managerial accounting has been mentioned in this COCO framework. What is Internal Control? Internal control can be explained as any action taken by an industry to assist increases the likelihood that the purposes of the industry will be achieved.
The experiment was divided into four sections with each section capturing the various aspects involved in various controllers. The controllers that were studied included the On-Off controllers, the proportional controllers and the integral and the derivative controllers.
Effective management is the key to improved organizational productivity and performance. Companies use management control systems to support organizational objectives, control activities, and drive organizational performance.
This usefulness is evidenced by the trend over the last 20 years toward investment in digital I&C applications in the process industries.
Eventually, this transition led to today's modern multilayered architectures in which (a) local controllers perform component control functions, (b) higher- (system-) level control stations coordinate in a supervisory mode the operations of multiple components in a system or multiple systems in a unit, and (c) higher-level stations perform plant-level supervisory functions and data analyses.
This has resulted in the adoption of policies, such as the ban on smoking in public places to ensure that there is a decrease in tobacco consumption within the country. A large number of those people who
The Department of Natural Resources identified the source of the water problems in the area to be the waste disposed by the factories of the Smithville Industrial Chemical in the water bodies of the region. However, later it was found out that the pollution were not being caused by the operations of the factories of Smithville Industrial Chemical.
6 Pages(1500 words)Essay
GOT A TRICKY QUESTION? RECEIVE AN ANSWER FROM STUDENTS LIKE YOU!
Let us find you another Essay on topic The vulnerabilities of industrial control systems and possible solutions for FREE!