logo

Information Management Systems Report

   

Added on  2022-09-15

5 Pages1463 Words16 Views
Running head: INFORMATION MANAGEMENT
INFORMATION MANAGEMENT
Name of the Student:
Name of the University:
Author Note:

INFORMATION MANAGEMENT1
Framework in oil and gas industry
There is cybersecurity’s few direct regulations in gas and oil industry, however there is
best practices as well as body for standards from both government and industry for helping the
organizations ensure that the status and policies meet the requirements to secure their own data
as well as infrastructure. Active defense strategy is proactive measure to detect or obtain
information of cyber cyberattack, cyber operation or cyber intrusion or to determine origin of
operation which involves launching preventive or preemptive counter operation against source.
(Leal-Arcas et al. 173). While the guidelines are voluntary however not mandatory, organization
which adopting strategies of Active Defense are recognized as the best practices within industry
for detecting cyber threats as well as the risks of ecosystem which is operated by it.. Oil and gas
industry is unique as well as faces unique challenges. Strategies of active defense could be
applied to framework of oil and gas sector for mitigating the cyber threats which could be faced
in this sector by blocking connections of network from source as well as alert system
administrator.
Technologies used in oil and gas industry
Systems of Operational Technology is used in oil and gas industries which oversee
location, velocity, volume as well as other crucial activities in production as well as distribution
of gas and oil sector produce wealth of proprietary and sensitive information, which are crucial
to economic health as well as physical safety of organization, facilities along with its employees.
By using strategies of active defense within this sector, the security threats would be blocked by
shutting down botnet that is used for conducting attacks of denial of service (DDoS) as well as
blocking connections of network from source. Strategy of active defense could also attack back
the system of the attacker and destroying ability of hacker to attack (Lamba and Anil 76870).
Unlike IT software and equipment that could be deployed for performing several tasks and could
be upgraded and updated frequently, OT system is intended in performing only one task, safety
and reliability are the primary attributes of OT technology. Data access is essential in oil and gas
sector. With IP networking’s integration as well as adoption of several other standardized
protocols within OT, cybersecurity in oil and gas sector is becoming crucial to safety having
chances of cyberattacks.
Solutions against threats in oil and gas industry
While oil and gas industries continue in prioritizing cybersecurity and there is good
progress to identify as well as resolve the vulnerabilities of cyber threats within oil and gas
sector. There is increase in cyber risks for the limited visibility of network communications for
the huge, complicated infrastructure of oil and gas industry, which might be financial loss,
environmental damage and employee injury if operational or cyber incident occurs (Wagner and
Daniel 430). For mitigating the cyberattacks in oil and gas sector, strategy of active defense
could be implemented in the system of oil and gas industry for blocking the infected network or
by shutting down botnets used for the attack. Active defense strategy is proactive measure to
detect or obtain information of cyber cyberattack, cyber operation or cyber intrusion or to
determine origin of operation which involves launching preventive or preemptive counter
operation against source (Sandoval and Catherine JK 91). Defending the system against

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Law Enforcement Organizations
|4
|677
|424

PfSense: A Comprehensive Cybersecurity Tool for Intrusion Detection System
|20
|3463
|311

Cybersecurity in Healthcare PDF
|6
|1139
|11

Managing Cyber Security Threats and Non-Cyber Security Threats
|11
|3818
|103

IT on Business Cyber Security Report 2022
|4
|367
|12

Cyber Security Issues and Challenges - PDF
|6
|1326
|55