logo

Emerging Threats.

   

Added on  2022-10-01

5 Pages462 Words82 Views
Emerging Threats
Name of the Student:
Name of the University:
Author note:

Introduction
SCADA is a security practise for protecting “supervisory control and data acquisition
(SCADA)” over the network. The countries such as China and several foreign nations
discovering the vulnerabilities in the system, exploiting by stealing the personal information
of the government employees and deploying those information in negative ways. To prevent
the cyber-attacks and provide security to the SCADA system it would be required to
implement some commonality and diversity that finally stops other countries from stealing
sensitive information from the government employees.
Discussion
The government of united state uses SCADA to store the information of their
government employee. It is a framework which control the system used in various industrial
operations. SCADA is considered as the most common industrial control system-(ICS).
However, the cyber attacker’s attempts cyber-attack against the system. Today, the system is
vulnerable to emerging threats (Bianco, 2016). These threats may have an effects on the
community as well as the economy.
Security for the SCADA network
Today, it is required to manage SCADA network system security to stop the cyber-
attacks from other countries over the system. Every part of the software, firmware,
applications and hardware needs to be mapped properly so anyone who has an access over
system should be documented (Gouglidis & Hutchison, 2017). Identifying each possible
access point for hacks and malware attack, monitoring and detecting vulnerable attack to the

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security & Ethical Hacking : Report
|9
|2386
|80

How Serious Are Cyber Security Attacks
|13
|3593
|224

Network Requirements and Mitigation
|5
|854
|95

ENGR9742 - Standards, Ethics & Compliance
|14
|3407
|130

CYBER SECURITY Name: Student Id: Name of univeristy:.
|8
|4621
|39

Cyber Security in Corporate Governance: Ways to Improve Cyber Resilience and Integration with Cyber Security
|12
|3215
|375