Measuring the Cyber Security Risk Assessment Methods for Scada System
نویسندگان
چکیده
The current situation with supervisory control and information procurement (SCADA) framework security is not similar with the vulnerabilities, dangers as on today and potential results. A large number of the SCADA frameworks are moderately shaky frameworks with endless and inescapable vulnerabilities. Seen data security dangers are once in a while talked about and assessed at administration level. Data security part of PC controlled basic foundations must be basically broke down. PC controlled foundations ought to be subjected to an extreme investigation. Challenges for SCADA framework security are examined in this paper. Suggestions have been made to fortify the safety efforts at PC controlled basic foundations like savvy matrix, transportation control, water circulation and others. These suggestions, when executed, will cut down essentially the danger of disappointment at basic foundations. In this paper we most survey diverse dangers states and their effect on Supervisory Control and Data Acquisition (SCADA framework). We likewise audit diverse philosophy in digital security hazard appraisal for SCADA framework. We examination distinctive dangers and place them into various classes. We additionally portray diverse hazard appraisal techniques, their points, applications, affect on up and coming dangers, contrast and distinctive strategies. We additionally investigate distinctive parts of helplessness in the framework. INTRODUCTION SCADA is the acronym of Supervisory Control and Data Acquisition [1], which is a correspondence innovation conspire for gathering information from far off offices and furthermore controlling them on control frameworks. SCADA frameworks have been being used over 30 years, and have turned out to be best in class and mind boggling as PC innovation has progressed. They are today fundamental for working basic frameworks, for example, electric power frameworks. SCADA framework is additionally a sort of Industrial Control System (ICS). An ICS controls forms in the mechanical division and in the parts which frame a Critical National Infrastructure (CNI) [2]. Amid the most recent ten years, the quantity of associations with SCADA frameworks and the utilization of web based systems have expanded quickly. SCADA frameworks have likewise moved from utilizing exclusive conventions and programming to utilizing an indistinguishable principles and arrangements from managerial IT frameworks. As an outcome, SCADA frameworks are presently being presented to dangers and vulnerabilities they have never been presented to, and to a considerably more prominent degree than prior [3]. The smooth and dependable operation of SCADA frameworks is key for such segments of CNI as vitality, water and transportation where both information obtaining and control are basically imperative. A boundless, enduring blackout of SCADA and, subsequently, CNI may make genuine unsettling influence a state and. The outcomes of a glitch of a SCADA framework might be unfavorable and may go from money related misfortune because of a gear and ecological harm to the loss of human life. [Hossain* 4(7): July, 2017] ISSN 2349-4506 Impact Factor: 2.785 Global Journal of Engineering Science and Research Management http: // www.gjesrm.com © Global Journal of Engineering Science and Research Management [2] Current SCADA frameworks are exceedingly refined, mind boggling and in light of cutting edge innovation frameworks. The heightening complexity and modernization and also constant persistent operation and circulated, multi-part engineering support the development of digital dangers to SCADA frameworks. SCADA frameworks are presented to an extensive variety of digital dangers additionally on account of the institutionalization of correspondence conventions and equipment segments, developing interconnectivity and inheritance. In reality, the capacity to complete a digital assault discredits the requirement for a physical assault if the frameworks inside the site can be closed down or put into an undesired and maybe insecure mode from outside, maybe abrogating interlocks, and bringing about weights, temperatures, rotational speeds and levels to go past safe points of confinement. The digital assault might be viewed as the simple alternative by aggressors, which might be attempted from another nation, with attribution of source hard to demonstrate. Essentially, as opposed to voyaging hundreds or thousands of miles to play out a physical assault on a very much safeguarded website, following quite a while of arranging, an able combative is at risk to rather to utilize SHODAN to decide the IP number of a SCADA framework situated on the opposite side of the world, download misuse code for the SCADA frameworks from Metasploit, then dispatch the assault by means of the obscurity administrations of TOR, maybe inside the time span of 1 hour or less. To put it plainly, SCADA/ICS frameworks must be shielded more vigorously than they are presently [4]. A scope of general IT hazard appraisal philosophies is utilized as a part of industry: Operationally Critical Threat and Vulnerability Evaluation (OCTAVE) [5], Central Computer and Telecommunications Agency Risk Analysis and Management Method (CRAMM), Consultative, Objective and Bi-functional Risk Analysis (COBRA) and CORAS, a model-based hazard evaluation strategy for security-basic frameworks [6]. Likewise there is an expansive scope of scholarly proposition such as Information Security Risk Analysis Method (ISRAM); Cost estimation, Benchmarking, and Risk Assessment (COBRA); SPRINT, a rearranged down to earth chance investigation philosophy; and the Business Process: Information Risk Management (BPIRM) system to give some examples. MATERIALS SCADA Architecture A SCADA framework comprises of equipment and programming parts, and of an interfacing network(s). Fig. 1 indicates bland equipment engineering of a SCADA framework. Engineering is framed by at least one control focuses and various field gadgets, for example, a RTU, Intelligent Electronic Device (IED) and Programmable Logic Controller (PLC) associated by a correspondence framework. A RTU gets information from field gadgets, changes over it to advanced information and sends it to the control focus and in addition gets computerized orders from the middle and handles alerts. A PLC is a computerized PC that screens sensors [7] and takes choices in view of a client made program to control valves, solenoids and different actuators. A control focus Incorporates a MTU, which issues orders to and assembles information from RTUs, it additionally stores and procedures information keeping in mind the end goal to show data to human administrators to bolster basic leadership. Human operators monitor and control the system from a control centre via Human–Machine Interface (HMI) displays. [Hossain* 4(7): July, 2017] ISSN 2349-4506 Impact Factor: 2.785 Global Journal of Engineering Science and Research Management http: // www.gjesrm.com © Global Journal of Engineering Science and Research Management [3] Fig 1: Generic SCADA hardware architecture (Source: NIST SP 800-82) Generally the SCADA system includes the following components: local processors, operating equipment, PLCs, instruments, remote terminal unit, intelligent electronic device, master terminal unit or host computers and a PC with human machine interface which is show in fig 2. Fig 2: Human machine interface in SCADA Cyber Security Challenge The security of SCADA frameworks is observed to be more entangled than that in the customary IT or Internet world. The early ordinary SCADA outlines don't give modern frameworks the security against digital assaults. Old control framework offices are still being used today and they are completely or incompletely associated with corporate IP systems reaching out to Internet [8]. This association is defenseless against digital fear based oppressors' focused on assault when any ensuring system and measure, for example, specific firewall comes up short. IT methods and offices at first were not intended for control frameworks, but rather are broadly utilized as a part of SCADA frameworks. These strategies and offices cannot fulfill the strict needs of SCADA security in the event that they are not changed or improved. For instance, IP based Sensor Network is not made for control frameworks, but rather their utilization is developing quickly in mechanical control interchanges. [Hossain* 4(7): July, 2017] ISSN 2349-4506 Impact Factor: 2.785 Global Journal of Engineering Science and Research Management http: // www.gjesrm.com © Global Journal of Engineering Science and Research Management [4] In the next section we will discuss different categories of threat and their impact on SCADA system. Threat Analysis "Threat" is normally, despite the fact that not reliably, characterized as: Threat = Capability + Intent + Opportunity. From the expository viewpoint, the definition expects the presence of a risk "source" – a performer or operator representing the danger. For some reasons, the defenselessness evaluation process is creating at a quicker pace than the risk appraisal handle [9]. While powerlessness appraisal helps in evaluating the ability consider the risk condition, acceptable evaluation of Intent and Opportunity is more troublesome. Notwithstanding the troubles it is vital and important to characterize and order the solid dangers and vulnerabilities for building security countermeasures for shielding the SCADA framework from them. Along these lines it is required to indicate the dangers at any rate on the subjective level before quantitative estimations, which is the principle center of this paper. Massoud Amin in EPRI defined three different kinds of threats related to power systems as follows: Attacks upon the power system: In this case, the electricity infrastructure itself is the primary target-with outages rippling into the customer base. The point of attack could be a single component – a critical substation or transmission tower [10]. Or there could be a simultaneous, multipronged attack intended to bring down an entire regional grid. Similarly the attack could target electricity markets, highly vulnerable because of their transitional status [11]. Attacks by the power system: Here, the ultimate target is the population, using parts of the electricity infrastructure as a weapon. Terrorists could use power plant cooling towers, for example, to disperse chemical or biological agents. Attacks through the power system: The target is the civil infrastructure in this case. Utility networks include multiple conduits for attack, including lines, pipes, underground cables, tunnels, and sewers. For example terrorists could couple an electromagnetic pulse through the grid to damage computer or telecommunications infrastructure. Among three classifications first one is identified with digital security while the second and third ones are all the more near the region of physical security. Digital security issues on SCADA systems are presented from the data organizes as the systems are coordinated with each other. Be that as it may, some of issues are brought on by human physical access with the use of general digital assault technique on IT systems to SCADA or control framework systems [12]. Many threats in communication networks are also applied to SCADA systems since they are connected to each other directly or indirectly [13]. It is strongly believe that many SCADA systems are exclusive to other networks, but it has been proved many times that they are indirectly connected to the Internet through the facilities for online maintenance. Threats to SCADA systems are classified into many kinds according to as shown in Table 1.
منابع مشابه
A review of cyber security risk assessment methods for SCADA systems
This paper reviews the state of the art in cyber security risk assessment of Supervisory Control and Data Acquisition (SCADA) systems. We select and in-detail examine twenty-four risk assessment methods developed for or applied in the context of a SCADA system. We describe the essence of the methods and then analyse them in terms of aim; application domain; the stages of risk management address...
متن کاملA Cyber Security Risk Assessment for the Design of I&c Systems in Nuclear Power Plants
The instrumentation and control (I&C) systems in nuclear power plants (NPPs) collect signals from sensors measuring plant parameters, integrate and evaluate sensor information, monitor plant performance, and generate signals to control plant devices for a safe operation of NPPs. Although the application of digital technology in industrial control systems (ICS) started a few decades ago, I&C sys...
متن کاملCyber security risk assessment for SCADA and DCS networks.
The growing dependence of critical infrastructures and industrial automation on interconnected physical and cyber-based control systems has resulted in a growing and previously unforeseen cyber security threat to supervisory control and data acquisition (SCADA) and distributed control systems (DCSs). It is critical that engineers and managers understand these issues and know how to locate the i...
متن کاملA Risk-Assessment Model for Cyber Attacks on Information Systems
Industrial process-plants are an integral part of a nation’s economy and critical infrastructure. The information systems used by automated industrial plants are enticing targets of cyber attacks. However, the financial damages resulting from these cyber attacks are difficult to estimate since the resultant losses are not as tangible as physical losses. In this paper, we propose a mathematical ...
متن کاملAdoption of ISMS for Protecting SCADA Systems against Cyber Terrorism Threats
The potential for catastrophic cyber attacks that can cripple the operations of critical infrastructures of nations is worrying. The consequences of cyber attack to the Supervisory Control and Data Acquisition (SCADA) systems are wide, resulting in potentially catastrophic damages and disruption. This paper proposes for the Critical National Information Infrastructure (CNII) organizations to co...
متن کاملIntrusion Detection via Machine Learning for SCADA System Protection
SCADA (Supervisory Control And Data Acquisition) systems have always been susceptible to cyber-attacks. Different types of cyber-attacks could occur depending on the architecture and configurations used in the SCADA system. To protect cyber infrastructure from above attacks a growing collaborative effort between cyber security professionals and researchers from private and academia has involved...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017