This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Dance

Risks and Vulnerability For Critical Infrastructure

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

 

 

 

 

 

 

 

 

 

 

 

 

Risks and Vulnerability For Critical Infrastructure

Name

Institution

Instructor

Date

 

 

 

 

 

 

Critical Infrastructure Risks and Vulnerability

Tools for Protecting SCADAs

Recently, there has been an increase in attacks on the Supervisory Control and Data Acquisition (SCADA) to harm the U.S critical infrastructure. According to Nazir et al. (2017), several tools and techniques have been employed to protect SCADA from global attacks. One of the tools used is the Air-Gap Systems. Using this tool enables the physical separation of the SCADA system from the internet and corporate network. The other technique used to protect the SCADA from attack is avoiding default configuration on network and security appliances. This is achieved by changing factory passwords and enforcing systems of strong passwords. The SCADA can also be protected from attack by applying USB and portable device security to move files in and out of the SCADA system. The other technique used to protect the SCADA from attack is defending against the advanced persistent threats. This involves preventing the advanced persistent threats from entering the network and also detecting the threats that have already entered the system. Lastly, performing regular penetration and vulnerability assessment is another technique used to protect SCADA from attacks.

Incorporating resilience

Incorporating resilience into the SCADA system is crucial because it protects the system from attacks and failures. SCADA system resilience against threats and attacks can be incorporated by using the peer- to- peer technique which has minimum intrusion into the SCADA core system (Babiceanu & Seker, 2019). Using this technique prevents the loss of data resulting from the malfunction of the nodes. Also, this technique identifies and corrects attacks on the integrity of data. Incorporating resilience using this technique utilizes the middleware model that causes little change to the SCADA software system. Using the peer-to-peer approach does not replace the functionality of the SCADA system; instead, it supplements and increases the resilience of the SCADA system. Utilizing this approach also ensures the avoidance of critical public network infrastructure, which in turn increases the strength of the SCADA system.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

References

Babiceanu, R. F., & Seker, R. (2019). Cyber resilience protection for the industrial internet of things: A software-defined networking approach. Computers in Industry104, 47-58.

Nazir, S., Patel, S., & Patel, D. (2017). Assessing and augmenting SCADA cybersecurity: A survey of techniques. Computers & Security70, 436-454.

 

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask