1.) Investigate three common vulnerabilities of ICSs and SCADA systems. Examine
ID: 3745065 • Letter: 1
Question
1.) Investigate three common vulnerabilities of ICSs and SCADA systems. Examine the vulnerabilities and summarize how you would discover them.
2.) Document how frequently you would expect the vulnerabilities to occur and provide at least three recommendations to mitigate them. Evaluate the threat actors you believe are most likely to exploit these vulnerabilities, detailing how they are a credible threat.
---For example, in a human/organization threat actor: Do they have motive? What is that motive? Do they have resources?
---For a natural disaster threat: What geographic areas are at greater risk? What is the worst-case scenario? What mitigations can be put into play?
3.) Conduct external research and implement three external sources with proper citations as supporting evidence.
Explanation / Answer
1)Three common vulnerabilities with ICS and SCADA systems:
2)These vulnerabilities can happen any time, so it is really important to mitigate those vulnerabilities as soon as possible. Here are 3 steps by which you can mitigate these above vulnerabilities:
Here are few methods that help to detect or exploit these vulnerabilities:
Several attacks can happen with political motive. Attackers can attack these system based on political grudges and thus the business get hampered.
For monetary benefits also, an attacker can attack into these systems and these systems are important in the production environment. Hence by hacking into these systems the hacker can demand money out of that. Hackers have got resources to find out the network loopholes and exploit the data in the systems.
In case of a disaster, such as earthquakes or floods or even fire, the datacentre can suffer huge loss. So, it is advisable to have a backup of every data to another datacentre farer from the disaster prone datacentre.
In case of worst case, the data can be migrated to private cloud; from there they can restore the data easily in case any emergencies occur to the datacentres.
3)Here are few citations of ICS and SCADA attacks:
These attacks happened because of either political motives or for monetary claims. Attackers exploited the loopholes and hacked the data.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.