1. A. Discuss the importance of SCADAsecurity. B. Why are SCADA systemsparticularly vulnerable to cyber treats? C. Using the X.805 securityframework as a reference, discuss the SCADA security...

1 answer below »
1. A. Discuss the importance of SCADA security.

B. Why are SCADA systems particularly vulnerable to cyber treats? C. Using the X.805 security framework as a reference, discuss the SCADA security requirements for an electric, water or oil refinery enterprise.



2. A. What is meant by “Multi-modal Biometrics” for access control? B. In theory and in practice, what quantifiable advantages and disadvantages can be attributed to multi-modal biometrics?


3. A. Discuss the tradeoffs between life health, safety and protection vs. information system protection in a fire protection policy.

B. Identify and discuss examples of fire protection practices which have been changed because of their effects on humans.



4. A. Identify and discuss the key differences between disaster recovery and business continuity. B. Compare and discuss the similarities and differences between “cold”, “warm” and “hot” sites. Explain whether these sites are elements of a disaster recovery plan or a business continuity plan.





Answered Same DayDec 29, 2021

Answer To: 1. A. Discuss the importance of SCADAsecurity. B. Why are SCADA systemsparticularly vulnerable to...

David answered on Dec 29 2021
116 Votes
1. A. Discuss the importance of SCADA security.
SCADA systems that tie along redistributed facilities like power, oil, and gas pipelines and water
distribution and waste material assortment systems were planned to be open,
robust, and
simply functioned and revamped, however not essentially secure. The move from trademarked
technologies to additional uniform and open resolutions in conjunction with the enlarged range of
connections amongst SCADA systems, workplace networks, and also the net has
created them additional at risk of styles of network attacks that are comparatively common
in workstation security.
B. Why are SCADA systems particularly vulnerable to cyber treats?
There are several threat vectors to a contemporary SCADA system. One is that the danger of
unauthorized access to the management software package, whether or not its human access or
changes evoked deliberately or fortuitously by virus infections and different software package threats
exist in on the management host device. Additional is that the threat of package admittance to the
system segments hosting SCADA devices. In several cases, the management protocol deficiencies
any type of scientific discipline security, permitting an assailant to regulate a SCADA device
by causing instructions over a network. In several cases SCADA users have expected that taking a VPN
offered sufficient defense, oblivious that security are often inconsequentially bypassed with physical
access to SCADA-related network cards and switches.
Manufacturing management retailers recommend imminent SCADA security like data Security with a
protection thorough strategy that influences common IT rehearses.
C. Using the X.805 security framework as a reference, discuss the SCADA security requirements for an
electric, water or oil refinery enterprise.
X.805 provides an all-inclusive, top down, end-to-end viewpoint on network security that may be
practical to network parts, facilities, and submissions as well as police investigation, amending, and
averting security susceptibilities. It is functional to all or any sorts of networks and across all layers of the
protocol stack. Check the image below:

Figure 1: X.805
2. A. What is meant by...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here