The vulnerabilities of industrial control systems and possible solutions - Essay Example

Only on StudentShare

Extract of sample
The vulnerabilities of industrial control systems and possible solutions

Industrial control systems (ICS) are imperative to the quality of life that most of society shares and depends on every day. These systems regulate the electricity, food supply, medical and chemical manufacturing, as well as many other processes and utilities that are used daily.After September 11, 2001, the threat of terrorist attacks became a high priority on the home front (Marsh 2006). Most people worried about airplanes, metro or subway systems, or bombs, but a few realized that with the computerization of control systems in a variety of industries becoming normal operating procedures, the risk of attack was just as possible as any other probable target. In fact, some of the systems, such as nuclear plants or chemical manufacturing companies, were more apt to be targeted than others. This concern led to the National Institute of Standards and Technology (NIST) to lead a 500 member forum to discuss cyber-security of the ICS regulating our lives and our country.At the conclusion of this 2004 forum, NIST produced the System Protection Profile-Industrial Control Systems (SPP-ICS) to use as guidelines and strategies to find the vulnerabilities in each facility and possible solutions. Some of the main concerns include terrorists and unfriendly governments, human error, disgruntled employees, bored teenagers, and natural disasters to name a few. However, most facilities looked only on the outside, without considering errors on the inside that could do as much damage as those external forces. ...
Download paper

Summary

Industrial control systems (ICS) are imperative to the quality of life that most of society shares and depends on every day. These systems regulate the electricity, food supply, medical and chemical manufacturing, as well as many other processes and utilities that are used daily…
Author : johnsonmarcus

Related Essays

Homelessness in the United States: causes and possible solutions
The recent increase in the homeless population has negatively affected the quality of life and has lowered down the economic growth. Due to this burning social issue thousands of people have got excluded from the status of being equal in participating in the economic growth of the country....
6 pages (1506 words) Essay
Computer forensic
The history of computer forensic starts with the first time a system administration had to figure out how and what a hacker had done to gain unauthorized access to explore the system. In the beginning, the classic hacker breaking into computer system was more interested in how things work than actually being malicious.As computer evolved out of academic to business and government, there was more data and resource at risk. Hackers incursions became an issue handled through legal channels. While deciding which internal or external parties should handle each aspect of forensics, organization...
18 pages (4518 words) Essay
Considering the Threats and Vulnerabilities of Information Systems: A Plan for Improvements
However, current considerations should be examined to further scrutinize the consequential effects of internal and external threats. To combat internal and external threats and guard information systems, proposed actions include the following: enhancements to the hiring and promotion processes, implementing a contingency in job appointments, enhancing sustainability of basic technology....
7 pages (1757 words) Essay
Procurement Control Systems
The review should include a check for accuracy and legitimacy. After the purchasing department receives the requisition, purchasing needs to submit the order to a vendor selection process. The company has omitted this step. If the material is a standard item, the selection should be on the basis of competitive bidding to assure the best price and reduce costs (Dall and West, 22). Buyer relationships or a vendor attribute system could be used for specialized material. This would help assure cost containment as well as reduce undue buyer-vendor influence and corruption of the process....
2 pages (502 words) Case Study
Technical Paper: Database Administrator for Department Store
The data model should also help the various retail offices communicate. A clear and thorough analysis of the functions, processes and transactions at the retail offices reveals the following entities....
6 pages (1506 words) Essay
Number Systems
The use of different symbols by different bases means that a no. system uses 10 different symbols and from the 11th no. the cycle of symbol repeats. The concept bases have long existed. Earlier for each of the counted nos. a different symbol was used. However the problem with this system was as the list of the no. counted increased so did the no. of symbols that were used. In fact there would be infinite no. of symbols if this system was followed. This problem was recognized early on by the human civilization and the concept of bases was introduced. Egyptians used a base of 2, Babylonians base...
4 pages (1004 words) Essay
Systems Thinking and Organisational Learning
In the final part, self reflection about how Self Organized Learning Environments promotes the creativity in the organizations will be discussed....
8 pages (2008 words) Essay
Got a tricky question? Receive an answer from students like you! Try us!