Question: Generate reference for this: A supervisory control and data acquisition ( SCADA ) system is a software program that monitors and controls a business or
Generate reference for this:
A supervisory control and data acquisition SCADA system is a software program that monitors and controls a business or piece of equipment. SCADA systems are used for realtime data collection and analysis, as well as control tasks in a variety of industries, making them a target for malicious hackers.
Stuxnet was one of the most complex malwares known in as it could selfreplicate and spread across multiple systems through many means such as Removable Drives, LAN, Server Message Block SMB File Sharing on the net, etc. This malware infected control system networks and was believed by some to have damaged up to a fifth of the nuclear power centrifuges in Iran. The Stuxnet malware was a wakeup call for SCADA systems around the world because it was considered the first known threat specifically targeting SCADA systems to control networks. The US Department of Homeland Security DHS Industrial Control Systems Cyber Emergency Team ICSCERT issued multiple guidelines on how to defend against Stuxnet malware, which has also infected systems in the US Stuxnet was dangerous because it exploited the autorun vulnerability. It also used security holes in Windows Print Spooler and Server Message Blocks SMB to provide shared access to files, printers, and other devices by taking advantage of a vulnerability in the Microsoft Windows Server service.
Cyber assaults on Ukraine's power grid occurred in and Cyber attackers knocked out monitoring stations and tripped switches at substations. They disrupted power to substations in the first strike, leaving people without power for up to six hours. They cut the power to nearly consumers in the second attack, which was more sophisticated than the first, but the power was restored in about three hours. The SCADA equipment did not work because of the attackers' manipulation of the management systems, and the operators had to manually restore power and close the switches that the attackers had opened remotely. The first attempt used remote control software to manually activate switches, while the second employed sophisticated malware to directly manipulate SCADA systems. The advanced malware employed in the second attack was eventually identified as CRASH OVERRIDE.
Although it is speculated that the intrusions were carried out with government objectives in mind, most of the intrusions are the result of a lack of security in the companies, and to this, we can add the high levels of insecurity that many critical systems, such as nuclear power plants, power plants, and traffic control systems, have. There are default credentials for devices used in Industrial Control Systems on the internet nowadays, and many organizations do not update these factory passwords, leaving open doors for cyber terrorists.
Internal and external threats can be managed through policies, procedures, and technologies that help prevent the misuse of privileges or reduce the damage they can cause.
Enterprisewide risk assessments should be conducted to learn about critical assets, vulnerabilities, and threats that could affect them.
Security software solutions and appliances should each have their own management policy and configuration documentation, with policies and controls well documented and regularly applied.
Install and setup software like Active Directory AD A system for securing endpoints, system for preventing intrusions, a system for detecting intrusions, A solution for web filtering, spam filter Traffic monitoring software, a system for managing privileged access, Software that encrypts data, at least twofactor authentication policy and mechanism for password management, Manager of telephone calls, System to prevent data loss, on Exchange Server, enable mailbox journaling, preferably with ediscovery software enabled.
Account and password control rules and practices must be strictly enforced. All users of the company must log in with credentials that are exclusive to them; each user must have their own login ID and password. While the administrative passwords must be changed to a stronger one after the software is installed.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
