Cyber security risk assessment for scada and dcs networks
|
1 |
|---|
CYBER SECURITY
Information has been a corner stone for power, economics, international relations and armed conflict for a very long time. Nowadays, the importance of information in global relations and security has expanded and its significance for political issues has grown, mostly because of the explosion of information and communication technology (ICT) into all facets of life in post-industrialized world[Myr12].
Cyber security refers to the techniques employed for the upholding of the reliability, privacy and availability of information[Jee17]. It enable us to protect and recuperate from hard disk failures and cyber-attacks. We are currently in a fragile digital world where there are advanced persistent threats that are capable of attacking and interfering with organizations’ digital assets and other cybercrimes[RVo13].
Problem statement........................................................................................................................4
Purpose.........................................................................................................................................5
CYBER SECURITY 4
Introduction
As technology continues to grow, so does the prospects and challenges directly caused by it. In these modern times, we are a crossroads between a society dependent on the internet and the prospective future of automation of machines, Internet of Things (IoT) and management of Big Data[Ral07]. This dependency on digital assets has brought out new global vices like cybercrime and industrial espionage. The digital and physical world are becoming more integrated and criminals and hackers are now threatening cyber-physical frameworks used in
CYBER SECURITY 5
This study intends to be the base for future development and is aimed to create a security concern over the developers of new technology to encourage the security of the users and the device management. As an emerging technology, it is essential that this crucial concept of cyber security is properly understood to make our digital assets more secure.
CYBER SECURITY 6
Types of cyber security
An effective cyber security scheme should employ the following core areas of security
4) Network security- this safeguards against unauthorized access in addition to malevolent insiders. For example, Access controls may require auxiliary logins, which could however soft-pedal productivity.
5) IoT security- IoT involves a variety of precarious and non- precarious cyber-physical systems like CCTV cameras and sensors. Security will have to be a priority on the development of these devices. Manufacturers without proper security protocols on their devices will soon be affected by exploits created to manipulate the behavior of these devices (Clemens 2016). The devices are capable of managing hardware that if not used properly can risk the user’s life.
acs. (2016). cybersecurity- threats challenges opportunities. 58.
Byres, E., & Lowe, J. (2004). Byres, E., & Lowe, J. (2004, October). The myths and facts behind
cyberpedia. (n.d.). WHAT IS CYBERSECURITY? Retrieved from paloaltonetworks:
https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-security
overview/
O’Connell, M. (2012). Cyber security without cyber war. Journal of Conflict and Security Law,
protection/what-is-cyber-security-how-to-build-a-cyber-security-strategy.html
CYBER SECURITY 9


