Sign In
Not register? Register Now!
Pages:
2 pages/≈550 words
Sources:
2 Sources
Style:
APA
Subject:
IT & Computer Science
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 10.8
Topic:

ICS and Wireless Sensor Network Security

Essay Instructions:

Assessment Description
It is critical to understand how to secure key U.S. infrastructure and embedded systems that are employed within industrial infrastructures utilized in Supervisory Control and Data Acquisition (SCADA). A few notable examples include power generation, water treatment, and air handling systems. Keep in mind that Industrial Control Systems (ICS) use wireless technologies to transmit control signals and capture instrumentation telemetry and feedback.
Directions: In a 350- to 500-word paper, explore the following:
-Identify at least 3 pieces of key U.S. infrastructure controlled by ICS, including the related attack surface and vulnerabilities associated with each selected infrastructure.
-Distinguish the means for capturing instrument telemetry, feedback control data, and associated security risks.
-Suggest security controls (countermeasures) for mitigating these vulnerabilities and attacks.

Essay Sample Content Preview:

ICS and Wireless Sensor Network Security
Student's Name
University Affiliation
Professor's Name
Course Title
Due Date
ICS and Wireless Sensor Network Security
Some of the pieces of key U.S. infrastructure controlled by ICS include the election system, water treatment systems by state governments, and the national terrorism advisory system. The attack surface for the election system is mainly illegal access to the voter information database (Cyber Security and Infrastructure Security Agency (2022). Access to this database could lead to targeted persuasion and manipulation of voters. For the water treatment, the attack surface would interfere with the integrity of the system. For instance, figures for the concentration of chemicals used in water treatment could be interfered with by a malicious attacker. For the national terrorism advisory system, an individual, group, or organization aiming to perpetrate terrorism may try to access key security documents or systems.
Some of the means for capturing telemetry and feedback control data are relatively similar for the three pieces of infrastructure outlined above. For instance, each system is equipped with a monitoring system that takes a log of every user who has accessed the system and what they did. Some means ...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

You Might Also Like Other Topics Related to terrorism essays:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!