Discussion Board
i need just 1 paragraph for each parts(3). 5-6 lines. No plagiarism please.. just add extra for each discussion board. NO NEED REFERENCES. REFERENCES I ADDED FOR YOU. FROM THAT REFERENCES JUST ADD ONE PARAGRAPH.
PART 1
INTRODUCTION:
Control systems provide the means to sense a physical process and implement changes to that process to provide a product or desired result. Modern control systems utilize communication and network components and architecture and are increasingly interconnected to business networks. Control systems have much different life cycles, measured in decades with many communication protocols. Maintenance is also managed differently. Uptime and reliability are priority. Control systems have many and diverse “actors” involved including operators, vendors, integrators, and contractors over the life cycle(ICS_2017).
From the different things I choose to explain more about The future of SCADA and control systems security as follows: Toward Improving Security
Internet and global e-business application requirements demand that companies increasingly implement computing infrastructures specifically designed for at least 99.999 percent availability.
This is the equivalent of less than 5.3 minutes of downtime a year. This is also a requirement for
the SCADA networks. In response to these trends, government and SCADA owners need to address increased security and support for high availability.
Lately, the government, NIST, academia, and several SCADA vendors have initiated a strategy to support SCADA security. The CVSS NM-SIG for network monitoring is discussing the Information. In addition, the Control Systems Security Event Monitoring (SEM) Working Group at Process Control Systems Forum PCSF is working on a method to regularly collect statistics from SCADA and DCS networks that are being monitored
for cyber security events. More efforts should be planned to reduce the vulnerabilities and improve the security operations of these systems. It is necessary to address not only the individual vulnerabilities, but the breadth of risks that can interfere with critical operations.
The complexity of control systems and greater need of compliance for safety, quality of service, and security of systems and data. SCADA security design and information security management can be improved by applying a wide range of control principles and methods as well productivity control, involving decision making under uncertainty with increased levels of decision support.
Therefore, the improvements for SCADA security have to be broad – at the systems level – and detailed – at the component level so that the activity that chosen fits with that regulation, and influences would incorporate that activity within a company’s Governance and Compliance strategies(Improving Security for SCADA Control Systems_2008).
REFERENCES:
ICS_2017, Industrial control systems: Protecting infrastructure.
RETRIEVED 2-7-18, FROM: https://csrc.nist.gov/CSRC/media/Events/ISPAB-DECEMBER- 2008- MEETING/documents/ICSsecurity_ISPAB-dec2008_SPMcGurk.pdf
Improving Security for SCADA Control Systems_2008, I Mariana Hentea
RETRIEVED 2-7-18, FROM:
https://pdfs.semanticscholar.org/d92b/9069fcdeca13…
PART 2
According to the textbook, there are 7 oversight activities. They are Auditing, Assessments, monitoring, modeling & simulation, testing, technical vulnerable assessments & penetration testing and finally training & awareness. Out of those seven oversight activities, I would like to choose monitoring in Water Supply stream.
The architecture od SCADA system is constructed with System functions, system components and system functioning. Transducers are used to send the data for acquisition. It is vital for system monitoring. Crossing the limits of acquisition data will fall under a warning. The complete database must be secured (Dobriceanu, bitoleanu, popescu, enache & subtirelu, 2008, p. 1071-1072).
System components for monitoring includes of transducers for data acquisition and Programmable logic control (PLC). All the stations of water supply or treatment need to equip with this both system components for basic monitoring needs such as, automating the system, basic functions like filtering and framing between limits etc. A local display will show all the details of monitoring (Dobriceanu et al, 2008, p. 1071).
A regulation Safe drinking water act (SDWA) which ensures the public health by providing the pure water by avoiding many contaminants. If we do not monitor the water supply stations, it is easy for the attackers to put the public health under risk (EPA).
References
Dobriceanu, M., bitoleanu, A., popescu, M., enachi, S & subtirelu, E. (2008). SCADA system for monitoring water supply networks.Wseas.us, p. (1071-1072). Retrieved from http://www.wseas.us/e-library/transactions/systems/2008/28-196.pdf
EPA. Background on drinking water standards in the safe drinking water act. Epa.gov. Retrieved fromhttps://www.epa.gov/dwstandardsregulations/background-drinking-water-standards-safe-drinking-water-act-sdwa
PART 3
After referring the handbook of SCADA and some online sources, I would like to discuss the oversight activities in an organization related to the SCADA architecture. There are several actions that may cover oversight which may be the responsibility of the senior management to comply with the policies. Some of them are Audits; the procedures are compared with the standards, Assessments; how properly controls are executed, Real-time monitoring, Modeling and testing, Technical vulnerability assessment (TVA) and Penetration testing (PenTest) and Training sessions for employees. (Radvanovsky & Brodsky, 2016)
The oversight activities like auditing need skills to acquire required information for the functional authorities and that will be simple. But the tough part is to organize the information among the functional authorities, then it is important to analyze the results and report them in a consolidated document to the management. The senior management does their part by concluding that the oversight compliance has been achieved. (Radvanovsky & Brodsky, 2016). The last step of the oversight will be the response that is found during the phases and how the requirements show impact within the organization, how the organization responds till requirements are met. These will need a continuous effort from the senior management, functional authority and the line management. These three groups will guide the changes required in the organization for good compliance with the standards. (Radvanovsky & Brodsky, 2016). With respect to the governance, the individual behavior is the most important aspect to the performance of the organization. In real-time, the auditing is related to the identification of requirements and management, responsibility, accountability and delegation in the organization. All of these intend to support the organization ability to comply with the standard procedures and finally the oversight can be termed as a team effort. (Radvanovsky & Brodsky, 2016)
References
Radvanovsky, R., & Brodsky, J. (2016). Handbook of SCADA/Control Systems Security, Second Edition. pg-224-226 CRC Press. Retrieved from
"You need a similar assignment done from scratch? Our qualified writers will help you with a guaranteed AI-free & plagiarism-free A+ quality paper, Confidentiality, Timely delivery & Livechat/phone Support.
Discount Code: CIPD30
Click ORDER NOW..


