logo

Vulnerabilities in SCADA

   

Added on  2023-04-21

7 Pages1173 Words237 Views
 | 
 | 
 | 
Running head: VULNERABILITIES IN SCADA
VULNERABILITIES IN SCADA
Name of the Student
Name of the University
Author note
Vulnerabilities in SCADA_1

2
VULNERABILITIES IN SCADA
Table of Contents
Vulnerability....................................................................................................................................3
Frequency........................................................................................................................................4
Recommendations............................................................................................................................5
Threat Creators................................................................................................................................6
References........................................................................................................................................7
Vulnerabilities in SCADA_2

3
VULNERABILITIES IN SCADA
Vulnerability
The major vulnerabilities that are present in the functioning of the SCADA and ICS systems
are as follows: -
Zero Day Vulnerability: Zero Day Vulnerability has the potential to degrade the accuracy
of the entire project. In case of occurrence of Zero Day Vulnerability the developers do
not get time to develop the patch and implement the same patch in order to overcome the
issue that is present in the entire system (Ullah & Mahmoud 2017). Occurrence of this
issue is not very high. This issue arises only during the setting up of the program that is to
be performed with the help of SCADA.
Zero Day Vulnerability cannot be detected with the help of the general versions of
antimalware or IDS and IPS devices. The methodology that is needed to be implemented
includes alerting of administrators regarding the outbound internet activities that are
unauthorized in nature. A general alert is to be sent which will indicate that the presence of
issues. Implementation of Honeyed method and Linear data transformation technique will help in
better management if the issue.
Data base injection: Data base injection is also termed as SQL injection. In this case a
malicious code is introduced to the program that is to be functioned in SCADA. As the
field devices are built in analog methodology implementation of database injection issues
arises. Due to the increase in IP communication in between 2 systems the chances of data
base injection also increase in a SCADA system (Ren, Yardley & Nahrstedt 2018)
Vulnerabilities in SCADA_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Analysis of Security Tools for JKL Company
|8
|1708
|98

Analyzing Security Options for JKL Company
|12
|841
|51

Chevron's Infrastructure Evaluation
|5
|701
|328

ManageEngineOpManage: Network Monitoring and Troubleshooting Solution
|8
|2219
|70

Assignment on CyberSecurity
|5
|823
|86

Networking Concepts Project || Sleep City Australia - MN503
|7
|1279
|40