Scada The Internet Has Changed A Great Research Paper

PAGES
2
WORDS
532
Cite

¶ … Scada The Internet has changed a great deal about modern life and business practices, as well as how information is stored by both private and public entities. A good example of one of these changes can be seen in the increased risks posed to SCADA (Supervisory Control and Data Acquisition) systems. SCADA is a method of controlling and monitoring industrial and critical infrastructure functions such as electricity, gas, water, waste, and railways. In previous, pre-Internet eras, these systems were inherently secure, because of limited connectivity. However, the Internet has infinitely expanded the ability of outsiders to breach security.

Although all Internet threats are potentially dangerous, threats to SCADA systems are particularly terrifying because of the material consequences they can have to people and the environment. Infrastructure...

...

For example, an attack on a SCADA-run sewage plant in Canada caused 800,000 liters of raw sewage to be released into local parks and rivers, causing the death of local marine life as well as discoloring the water and generating a noxious stench that permeated the air. Other risks include impeding the ability of nuclear power plants to operate properly. In the wrong hands, it is easy to see how compromised network security of SCADAs could become a weapon of warfare or a weapon for terrorists as well as renegade hackers. "Such utilities are essential in the proper functioning of our daily life; therefore, their security and protection are extremely important as well as being of national concern."
Privacy protection of…

Sources Used in Documents:

Although all Internet threats are potentially dangerous, threats to SCADA systems are particularly terrifying because of the material consequences they can have to people and the environment. Infrastructure can be damaged and lives can be lost, thanks to the increased reliance upon controlling and monitoring infrastructures through technology. For example, an attack on a SCADA-run sewage plant in Canada caused 800,000 liters of raw sewage to be released into local parks and rivers, causing the death of local marine life as well as discoloring the water and generating a noxious stench that permeated the air. Other risks include impeding the ability of nuclear power plants to operate properly. In the wrong hands, it is easy to see how compromised network security of SCADAs could become a weapon of warfare or a weapon for terrorists as well as renegade hackers. "Such utilities are essential in the proper functioning of our daily life; therefore, their security and protection are extremely important as well as being of national concern."

Privacy protection of SCADA is thus essential. Privacy frameworks must be able to deal with multivariate data; they must be efficient and privacy-preserving data mining algorithms must perform well in terms of their computational cost. The data must be of high quality and able to be shared with others to improve the protection of privacy of SCADA nationally and world-wide. All must be able to guard against such attacks. Impingements of SCADA systems can have effects much larger than those upon a single nation, yet another argument for sharing optimized technology to protect their security. Finally the privacy-preserving data mining method should also prevent the discovery of sensitive information in published data.

Data security can be validated in a number of ways, one of which is the KDD99 method. A fairly old, well-tested and long-standing method that has existed since 1999, it is still the data set most commonly used for the evaluation of anomaly detection methods. The data training set can simulate a number of the most common types of attacks including a Denial of Service Attack (DoS), User to Root Attack (U2R), Remote to Local Attack (R2L) and a Probing Attack. KDD99 method is based on DARPA98, "about 4 gigabytes of compressed raw (binary) tcp- dump data of 7 weeks of network track which can be processed into about 5 million connection records, each with about 100 bytes. The two weeks of test data have around 2 million connection records. The KDD training data set consists of approximately 4,900,000 single connection vectors each of which contains 41 features and is labeled as either normal or an attack, with exactly one specific attack type."


Cite this Document:

"Scada The Internet Has Changed A Great" (2012, December 06) Retrieved April 24, 2024, from
https://www.paperdue.com/essay/scada-the-internet-has-changed-a-great-106118

"Scada The Internet Has Changed A Great" 06 December 2012. Web.24 April. 2024. <
https://www.paperdue.com/essay/scada-the-internet-has-changed-a-great-106118>

"Scada The Internet Has Changed A Great", 06 December 2012, Accessed.24 April. 2024,
https://www.paperdue.com/essay/scada-the-internet-has-changed-a-great-106118

Related Documents

" (Muntenu, 2004) According to Muntenu (2004) "It is almost impossible for a security analyst with only technical background to quantify security risk for intangible assets. He can perform a quantitative or qualitative evaluation using dedicated software to improve the security of the information systems, but not a complete risk assessment for the whole information system. Qualitative assessment based on questionnaires use in fact statistical quantitative methods to obtain results. Statistical

The increasing skill of these terrorists in using cyberspace has led some officials to believe that they are on the point of using computers for increasing bloodshed. This new threat is not similar to hackers' earlier using computers for passing viruses and worms. This has now reached a level of being able to reach the meeting point of computers and physical structures controlled by computers. The belief of analysts

Preventing Terrorist Attacks on the Water and Wastewater Systems Sector Terrorism is nowadays an already established threat that is part of every security strategy of modern states. It is not only an un-conventional threat at the address of national security but also it drove the re-definition of the term of security as it was understood and worked with some twenty years ago. Currently, there is talk about economic, political, social security

The fact that industrial control systems may be vulnerable to infiltration by other citizens, or international parties puts laws pertaining to intersection of systems transmission at the forefront of priorities for us all. At present, telecommunications interference of private citizens holds an up to a five-year prison sentence by U.S. federal law. How cyberterrorism is addressed, when the stakes are heightened, leaves a whole host of opportunities for citizens, and

They include the use of stealthy tactics, tools and techniques in order to avoid detection by antimalware software. The second goal is to create a backdoor that allows the attackers to gain greater access to the compromised software especially if other access points are discovered or patched. The third goal is to initiate the primary mission of the attackers which may be to steal sensitive information, monitor communications or

Introduction A manufacturing system includes four different components together with the production machine, material handling system, computer control system, and human resources (Lee, 1998). In recent times, due to the technological advancement, automation of manufacturing systems has continued to become prevalent. A key aspect in the contemporary automotive manufacturing systems and automotive industries is automation. An automated manufacturing system alludes to an intersected or interrelated system of material processing stations with