Cyber Security Management

Read Complete Research Material

CYBER SECURITY MANAGEMENT

Cyber Security Management in a Real Time Distributed Control Systems: A Field Based Case Study

By

ABSTRACT

Real time distributed control systems are widely distributed systems, and require a large number of remote terminals, each controlling a small number of devices, and gathering data from a small number of sensors. In a complex system, it works as central processing unit, thus are vulnerable to various types of security threats. The objective of this paper is to present an introduction to the cyber security management in a real time distributed control systems. The paper further explores what real time distributed control systems are and why they are used. It also evaluates the vulnerability of real time distributed control or SCADA systems to cyber threats. The method used for conducting the research is secondary. Thus, after reviewing and analyzing the presented data, beneficial results and conclusions are put forward.

TABLE OF CONTENTS

ABSTRACTII

CHAPTER 1: INTRODUCTION1

Background1

Aims and Objectives2

Research Questions2

Definition of SCADA2

CHAPTER 2: LITERATURE REVIEW3

Overview of Real Time Distributed Control Systems3

SCADA and IT Systems4

Past Cyber Attacks and Incidents in Distributed Control Systems5

Distributed Control System Security5

SCADA Attack Topology Vulnerabilities7

CHAPTER 3: METHODOLOGY9

Research Design9

Research Method9

Data Analysis Method10

Secondary Data10

Qualitative Research10

Literature Search11

CHAPTER 4: DISCUSSION AND ANALYSIS12

Real Time Distributed Control Systems Utilization Area12

Real Time Distributed Control Systems Security Issues13

Vulnerabilities in Real Time Distributed Control Systems to Cyber Threats13

Securing Real Time Distributed Control Systems15

Cryptography for Securing Distributed Control Systems Networks17

CHAPTER 5: CONCLUSION20

REFERENCES21

CHAPTER 1: INTRODUCTION

Background

Real time distributed control systems or SCADA systems are used in the operation of many industrial systems, from the power grid to potable water distribution (Boyer, 1999). They are used to automate large, monolithic systems which are critical to the health and well-being of the citizenry. These systems are widely distributed, and require a large number of remote terminals, each controlling a small number of devices, and gathering data from a small number of sensors (Donald, 2003). Many of these systems are connected to a central control location by a variety of possible commodity communications systems, ranging from radio links to industrial Ethernet connections. Unfortunately, as these systems have grown larger, the pervasiveness and public awareness of these commodity communications systems has also grown.

Corporations and utilities can no longer rely on security through obscurity to protect these systems. Further, with the growth of the Internet, these systems have become increasingly connected, forcing industries to defend against security threats well outside these systems' design parameters (Rinaldi, et al., 2001). Network security and an understanding of these communications problems can only provide a modest amount of security. Drop in modules can provide additional security, but these control systems have product lifetimes measured in decades. The security solutions used in these modules may find them-selves outmoded or broken in a few months or years, becoming a huge expense to any company maintaining a device's security (Knezo, 2002).

Aims and Objectives

The research aims at studying cyber security management in a real time distributed control systems as a field based case study. In addition, the research has following objectives:

To explore what real time distributed control systems are ...
Related Ads