Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Vulnerability Assessment of Cybersecurity for SCADA Systems
#1

The electric power systems needs vulnerability assessment which is made mandatory by the NERC s cybersecurity standards. This article studies the impact of a cyber attack on supervisory control and data acquisition (SCADA) systems. as the system becomes more dispersed in wide areas, the requirement to meet the standard has become increasingly challenging. The the vulnerabilities of SCADAsystems is evaluated at three leels viz. system, scenarios, and access points. The model of cyber systems embedded with the firewall and password models is what this system bases on .
Great attention has been paid to the security of critical infrastructure. SCADA systems have security threats ranging from computer system to power
system aspects. once the computer system security
is compromised, an attack can be deployed immediately and may cause may cause catastrophic damages.

SYSTEM MODEL AND VULNERABILITIES
The control center cybernet environment describes the corporate networks that are usually firewall protected. The substation and power plant networks are maintained by IT personnel. Virtual private network (VPN) is a cybersecurity technology used to connect with other corporate networks. The other machines within the networks can be remotely controlled using the facility of the Remote logon programs in the VPN. Attackers use many sophisticated intrusion tools including:
-Scanning: which scans the IP addresses of the target to get open ports
-War dialing: once the main phone number prefix is determined, It can be executed in the scripts to get the potential connection to the surrounding numbers.
-Traffic sniffing: The packets traversing within a network is analysed using a network analyser.
-Password cracking:The password is guessed repeatedly by brute force.

get the report pdf here:
http://mediafire?dpf9g5pqgvuwrz5
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

Powered By MyBB, © 2002-2024 iAndrew & Melroy van den Berg.