Verified Document

Scada The Internet Has Changed A Great Research Paper

¶ … Scada The Internet has changed a great deal about modern life and business practices, as well as how information is stored by both private and public entities. A good example of one of these changes can be seen in the increased risks posed to SCADA (Supervisory Control and Data Acquisition) systems. SCADA is a method of controlling and monitoring industrial and critical infrastructure functions such as electricity, gas, water, waste, and railways. In previous, pre-Internet eras, these systems were inherently secure, because of limited connectivity. However, the Internet has infinitely expanded the ability of outsiders to breach security.

Although all Internet threats are potentially dangerous, threats to SCADA systems are particularly terrifying because of the material consequences they can have to people and the environment. Infrastructure...

For example, an attack on a SCADA-run sewage plant in Canada caused 800,000 liters of raw sewage to be released into local parks and rivers, causing the death of local marine life as well as discoloring the water and generating a noxious stench that permeated the air. Other risks include impeding the ability of nuclear power plants to operate properly. In the wrong hands, it is easy to see how compromised network security of SCADAs could become a weapon of warfare or a weapon for terrorists as well as renegade hackers. "Such utilities are essential in the proper functioning of our daily life; therefore, their security and protection are extremely important as well as being of national concern."
Privacy protection of…

Sources used in this document:
Although all Internet threats are potentially dangerous, threats to SCADA systems are particularly terrifying because of the material consequences they can have to people and the environment. Infrastructure can be damaged and lives can be lost, thanks to the increased reliance upon controlling and monitoring infrastructures through technology. For example, an attack on a SCADA-run sewage plant in Canada caused 800,000 liters of raw sewage to be released into local parks and rivers, causing the death of local marine life as well as discoloring the water and generating a noxious stench that permeated the air. Other risks include impeding the ability of nuclear power plants to operate properly. In the wrong hands, it is easy to see how compromised network security of SCADAs could become a weapon of warfare or a weapon for terrorists as well as renegade hackers. "Such utilities are essential in the proper functioning of our daily life; therefore, their security and protection are extremely important as well as being of national concern."

Privacy protection of SCADA is thus essential. Privacy frameworks must be able to deal with multivariate data; they must be efficient and privacy-preserving data mining algorithms must perform well in terms of their computational cost. The data must be of high quality and able to be shared with others to improve the protection of privacy of SCADA nationally and world-wide. All must be able to guard against such attacks. Impingements of SCADA systems can have effects much larger than those upon a single nation, yet another argument for sharing optimized technology to protect their security. Finally the privacy-preserving data mining method should also prevent the discovery of sensitive information in published data.

Data security can be validated in a number of ways, one of which is the KDD99 method. A fairly old, well-tested and long-standing method that has existed since 1999, it is still the data set most commonly used for the evaluation of anomaly detection methods. The data training set can simulate a number of the most common types of attacks including a Denial of Service Attack (DoS), User to Root Attack (U2R), Remote to Local Attack (R2L) and a Probing Attack. KDD99 method is based on DARPA98, "about 4 gigabytes of compressed raw (binary) tcp- dump data of 7 weeks of network track which can be processed into about 5 million connection records, each with about 100 bytes. The two weeks of test data have around 2 million connection records. The KDD training data set consists of approximately 4,900,000 single connection vectors each of which contains 41 features and is labeled as either normal or an attack, with exactly one specific attack type."
Cite this Document:
Copy Bibliography Citation

Related Documents

Cyber-Citizen, USA Cyber-Citizen USA the
Words: 5130 Length: 20 Document Type: Research Paper

The fact that industrial control systems may be vulnerable to infiltration by other citizens, or international parties puts laws pertaining to intersection of systems transmission at the forefront of priorities for us all. At present, telecommunications interference of private citizens holds an up to a five-year prison sentence by U.S. federal law. How cyberterrorism is addressed, when the stakes are heightened, leaves a whole host of opportunities for citizens, and

Preventing Terrorist Attacks on the Water and Wastewater Systems...
Words: 2251 Length: 7 Document Type: Research Paper

Preventing Terrorist Attacks on the Water and Wastewater Systems Sector Terrorism is nowadays an already established threat that is part of every security strategy of modern states. It is not only an un-conventional threat at the address of national security but also it drove the re-definition of the term of security as it was understood and worked with some twenty years ago. Currently, there is talk about economic, political, social security

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now