...So far we have studied the use of Distributed Control Systems in Frontier Refineries as a close example of the use of a SCADA-like system in the oil industry. Implementing the capability of satellites to these systems has allowed broadening their utilization potential to other industries, including government and military defense uses within the domain of national security. This can lead us to an analysis of the financial sustainability of these systems for the-at least for now-near future. Based on what we have learned about the oil industry-the need for continuous monitoring and control of diverse assets in the plant/field-we can conclude that the basic functions-pipeline, tank and pump monitoring, leak detection, etc-are operations that will maintain steady usage in spite of fluctuating financial conditions in the oil/gas market. We expect also that, given the conditions of international relations, the military and government need of SCADA systems for anti-terrorism and peacekeeping efforts will not be affected by variations in credit markets. In fact, the more this security around this technology is developed, the more we expect security-sensitive users such as the military will make use of them. We should also consider the possibility that a shift in international relations policies might dampen the demand growth rate for SCADA/Satellite systems. The sources studied for this report also make another consideration: the uncertain and variable situation in the Middle East...
Words: 719 - Pages: 3
...Case Study 2: Information Security and the National Infrastructure Tamika C. McCray Professor Darrel Nerove SEC 310 – Homeland Security July 19, 2012 In reading the article, I gather that our country’s natural resources might be at very real danger due to cyber threats. I am once again surprised that there is no effective plan in place for protecting these very important resources. In any company that has something to lose, there should be appropriate security measures taken in accessing their company information. Along with those passwords, a level of security needs to be given to each individual with a password. Learning of the different security possibilities to protect our resources should be at the top of voter’s lists along with job security and a few other things this coming election. If we are easily hacked with simple things, more individual than world-wide, we should take heed when a security breech on a national level will affect millions. All possible threats should be taken seriously as with everything being wireless these days, there is more of a chance for hackers to find a way to get through the cracks. The fact that these industries rely heavily on information technology to conduct everyday service alone is a very real reason to be concerned. Being that there might be thousands of miles between employees, branches and facilities that operate in these areas, there is a great emphasis on telecommuting. When dealing with any type of outpost employment...
Words: 835 - Pages: 4
...Iran. How the virus works and propagated itself onto servers It primarily spreads via USB sticks, which allows it to get into computers and networks not normally connected to the Internet. Once inside a network, it uses a variety of mechanisms to propagate to other machines within that network and gain privilege once it has infected those machines. These mechanisms include both known and patched vulnerabilities, and four “zero-day exploits”: vulnerabilities that were unknown and unpatched when the worm was released. (All the infection vulnerabilities have since been patched.) Stuxnet also acted like a rootkit – hiding its actions and its presence. It was the first virus to include code to attack Supervisory Control and Data Acquisition (SCADA) systems. Discovered by Sergey Ulasen in June, 2010, was at the time working for a small...
Words: 1413 - Pages: 6
...Research paper 1 SCADA Attack worldwide In era of modern technology evolves and it change continuously over the time as well as it creates risk or threat. The emergence of Internet and worldwide technologies as these systems were tightly integrated with business systems and became more exposed to cyber threats. Supervisory Control and Data Acquisition (SCADA) protocols are communications protocols designed for the exchange of control messages on industrial networks. A control system is a device or set of devices to manage, command, direct, or regulate the behavior of other devices or systems. By complexity, the reliable operation of modern infrastructures depends on computerized systems and SCADA systems. These control systems and devices communicated with each other almost exclusively, and rarely shared information with systems outside their environment. As more components of control systems become interconnected with the outside world using IP-based standards, the probability and impact of a cyber attack is at highest risk. Complexity of SCADA architectures, there is a variety of both wired and wireless media and protocols involved in getting data back to the central monitoring site. This enables implementation of powerful IP-base SCADA networks over mixed cellular, satellite, and landline systems. SCADA communications can employ a diverse range of both wired (lease...
Words: 884 - Pages: 4
...industries. Bentek Systems' Scope of Supply includes System Design, Systems Integration, Equipment Supply, Installation and Field Services. Bentek Systems offers SCADA Hosting service for industrial application. With over 20 years of experience and expertise in SCADA systems and industrial applications, our clients can be confident in our Hosted SCADA solution. Bentek Systems have a range of SCADA host software that provides local plant site monitoring to enterprise-wide SCADA Systems for the Oil & Gas, Water and Environment Industry. We use NetSCADA,which is a a Client-Server SCADA host software, which enables clients to login securely to monitor their remote sites by viewing data through Monitoring, Alarming, Historical Trending & Reporting graphical screens. The SCADALink SAT100 is a flexible low power satellite SCADA device that provides Modem, RTU, and Alarm Callout in a single device. It is designed for remote SCADA communications and monitoring to RS232/RS485 serial devices such as Flow Computers, RTU, PLC, Smart Transmitters and Power Meters inaccessible by terrestial communications. The SAT100's low power draw makes it an ideal solution for many remote SCADA applications SAT100 works with SCADALink SatSCADA Server software to provide a complete end-to-end satellite networking solution, allowing SCADA Hosts to reach SAT100 terminals located anywhere in the world. Alarm Callout ability means that it can be configured to generate callout messages on Alarm...
Words: 588 - Pages: 3
...Ch05 ControlSys-4e-A&S 03-21, 03-22-2013 Chapter 5 INDUSTRIAL CONTROL SYSTEMS REVIEW QUESTIONS 5.1 What is industrial control? Answer: As defined in the text, industrial control is the automatic regulation of unit operations and their associated equipment as well as the integration and coordination of the unit operations in the larger production system. 5.2 What is the difference between a continuous variable and a discrete variable? Answer: A continuous variable is one that is uninterrupted as time proceeds, and it is generally considered to be analog, which means it can take on any value within a certain range. A discrete variable is one that can take on only certain values within a given range, such as on or off. 5.3 Name and briefly define each of the three types of discrete variables. Answer: The three types of discrete variables are (1) binary, (2) discrete other than binary, and (3) pulse data. Binary means the variable can take on either of two possible values, ON or OFF, open or closed, and so on. Discrete variables other than binary are variables that can take on more than two possible values but less than an infinite number. Pulse data consist of a series of pulses and each pulse can be counted. 5.4 What is the difference between a continuous control system and a discrete control system? Answer: A continuous control system is one in which the variables and parameters are continuous and analog. A discrete control system is one...
Words: 1598 - Pages: 7
...To study about various PLCs, programming of PLCs, study of SCADA software and designing and scripting of process in SCADA and to study about communication of SCADA software and PLC using KEP server software. In this project solve power theft in power system distribution and save time in electricity billing system by using SCADA system and save energy. Solving problem in power system transmission and distribution. OBJECTIVE Following are the objectives achieved by the completion of work. 1. PLC based programming using WPL SOFT software for Delta plc. 2. Designing in SCADA using Wonder ware’s INTOUCH software. 3. interfacing...
Words: 754 - Pages: 4
...Satellite SCADA for treatment plants | ISA http://www.isa.org/PrinterTemplate.cfm?Section=InTech_Home1&tem... 09 April 2001 by Eric Silverman The technology is available, but is it cost effective? Dedicated, satellite-based business communications using relatively small dish antennas, or very small aperture terminals (VSATs), are no longer only for governments and colossal corporations. An industry study predicted in 1990 that supervisory control and data acquisition (SCADA) services would become a market for VSAT technology by the mid-1990s. VSAT SCADA is now an important tool in the oil, pipeline, and electric utility markets, fulfilling the prediction. VSAT has been successful in these industries, according to Satellite Communications contributor Phil Samuels, because the "electric, gas, and liquid transmission systems transit vast distances, often far from telecommunications and electrical power sources. Monitoring of these transmission facilities and the ability to take action to control their operations are important for inventory, regulatory, and safety reasons." Following its successful entry into these markets, the VSAT industry is now looking for new SCADA applications. One market to attract its interest is water and wastewater treatment, currently about 0.5% of VSAT SCADA installations. A close look suggests VSAT might soon play an important role in water and wastewater plant SCADA. The VSAT SCADA system for a typical water or wastewater treatment plant...
Words: 1016 - Pages: 5
...CIS 462 Case Study 2: SCADA Worm Follow Below Link to Download Tutorial https://homeworklance.com/downloads/cis-462-case-study-2-scada-worm/ For More Information Visit Our Website ( https://homeworklance.com/ ) Email us At: Support@homeworklance.com or lancehomework@gmail.com Case Study 2: SCADA Worm Due Week 6 and worth 100 points Protecting the nation’s critical infrastructure is a major security challenge within the U.S. Likewise, the responsibility for protecting the nation’s critical infrastructure encompasses all sectors of government, including private sector cooperation. Search on the Internet for information on the SCADA Worm, such as the article located at http://www.theregister.co.uk/2010/09/22/stuxnet_worm_weapon/. Write a three to five (3-5) page paper in which you: 1. Describe the impact and the vulnerability of the SCADA / Stuxnet Worm on the critical infrastructure of the United States. 2. Describe the methods to mitigate the vulnerabilities, as they relate to the seven (7) domains. 3. Assess the levels of responsibility between government agencies and the private sector for mitigating threats and vulnerabilities to our critical infrastructure. 4. Assess the elements of an effective IT Security Policy Framework, and how these elements, if properly implemented, could prevent or mitigate and attack similar to the SCADA / Stuxnet Worm. 5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do...
Words: 425 - Pages: 2
...Position Paper for Beyond SCADA: Networked Embedded Control for Cyber Physical Systems workshop SCADA and GIS for drinking water distribution system monitoring and response: critical gaps Shannon L. Isovitsch1 and Jeanne M. VanBriesen2 SCADA is frequently used to manage and control drinking water treatment systems. In this application, SCADA systems perform remote monitoring and operations control along with data management and storage. SCADA systems often serve the joint purposes of operational information and regulatory compliance data management, The most important challenge in the advancement of SCADA systems in the drinking water industry is the need for monitoring and control throughout the distribution system, rather than only at the treatment plant and water sources. This will require integrating existing SCADA systems with numerical distribution system models to enable better model calibration and demand estimation, simulation of past events for analysis, and simulation of emergency situations for response training. We anticipate this integration will highlight the need for spatial as well as temporal data storage and analysis through GIS, and the need for the expansion of SCADA systems to track water quality as well as quantity. SCADA systems at a water utility are currently used to monitor flows and pressures at the treatment plant and associated water sources. Water quality monitoring is often performed by grab sampling to meet regulatory requirements. While grab...
Words: 835 - Pages: 4
...SULLIVAN UNIVERSITY | Cyber Security | | Patrice Brockington | 4/20/2013 | | Cyber Security The security of online files, applications, documents, consumer information, and organization information are just some of the valued items that need to be secure from cyber threats. Companies and organization that utilize the internet to conduct business know all too well the importance of securing the information and any and all information of those that they do business with. Having some general knowledge of what cyber security is and the importance of it is our purpose in this brief. Cyber security is the “measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack”, as defined by Merriam-Webster.com (Online, 2013). In general practice cyber security is simply securing online information and service systems. If you ever entered your name, address or any personal information online or into some database to win a prize this information is online or somehow accessible via the Internet. It is this type of information that so many millions of people are concerned about if it is secure or not, since it is out on the Internet. “The nation’s critical infrastructure relies heavily on the Internet for everything from submitting taxes, to applying for student loans, to following traffic signals, to even powering our homes” (Government, 2013). This is why cyber security is one of this country’s most important national...
Words: 645 - Pages: 3
...Project Proposal The Implementation of Cloud computing and existing Database System in Conventional Power plants Rahul Shah (rahul09oct@gmail.com) MIS-535 Prof. Nichelle Manuel Table of Contents Abstract 3 Company Background 3 Business Problems 3 High-Level Solution 4 Smart grid and Cloud computing 5 SCADA and Cloud computing 6 Benefits of solving the problem 7 Business/ Technical Approach 9 Cloud computing Infrastructure 10 Integration of all plant and customer activities in one database 10 Provision of Internet Protocol Security 11 Moving Smart grids and SCADA to cloud 11 High-level Implementation Plan 11 Set up a program architecture that considers risk and industry maturity 12 Usage of technology for a long term 12 Maintain significant focus on IT integration activities ...
Words: 3880 - Pages: 16
...and response are both captured but ART suffers from the problem of state-space explosion, since solution of ART is obtained by means of a state-space model. In this paper, we present a novel attack tree paradigm called attack countermeasure tree (ACT) which avoids the generation and solution of a state-space model and takes into account attacks as well as countermeasures (in the form of detection and mitigation events). In ACT, detection and mitigation are allowed not just at the leaf node but also at the intermediate nodes while at the same time the state-space explosion problem is avoided in its analysis. We study the consequences of incorporating countermeasures in the ACT using three case studies (ACT for BGP attack, ACT for a SCADA attack and ACT for malicious insider attacks). Copyright © 2011 John Wiley & Sons, Ltd. KEYWORDS attack trees; non-state-space model; mincuts;...
Words: 8828 - Pages: 36
...INTRODUCCION El presente trabajo titulado “Diseño de un sistema de Control Supervisorio y Adquisición de Datos (SCADA) para el monitoreo remoto de los Sistema de Energía Ininterrumpida (UPS) perteneciente al sistema eléctrico de una refinería en el país”, esta enfocado al desarrollo de la capacidad inventiva en la solución de problemas que se puedan presentar en situaciones reales en la industria, aplicando los conocimientos y experiencias adquiridas a lo largo de la carrera de Ingeniería Electrica, con un primordial enfoque al aprendizaje y desarrollo de nuevas tecnologías, como la incorporación de nuevos sistemas de control supervisorio y adquisición de datos (SCADA), utilizados actualmente en el parque industrial; de esta forma se logra mantener una constante tendencia tecnológica a lo reciente en los conocimientos adquiridos en nuestra carrera en el área de Automatización Industrial y Control de Procesos, lo cual, como en el caso del presente proyecto en particular, permitirá encontrar solución a diversas problemáticas planteadas en el campo de la electricidad, específicamente en el monitoreo y supervisión de los Sistemas de Energía Ininterrumpida (UPS) y el nivel de importancia que representan estos equipos para la continuidad del proceso productivo de la empresa. En la actualidad la automatización de procesos en las diferentes actividades de la vida del hombre, se ha convertido en una necesidad. Existen procesos que por su complejidad o condición de seguridad, no pueden...
Words: 21614 - Pages: 87
...Project Management Assignment #1 MGT5164 City of Thunder Bay/Environment Division Digital SCADA Network Project Student Name: Joe Doe PROJECT INTRODUCTION ....................................................................................................... 2 Project Name........................................................................................................................................... 2 Scope and Objectives.............................................................................................................................. 2 Major Deliverables ................................................................................................................................. 2 OUTLINE OF WORK ................................................................................................................... 3 Resources................................................................................................................................................. 3 Customer Requirements ........................................................................................................................ 3 Key Attributes......................................................................................................................................... 3 PROJECT METHODOLOGY....................................................................................................... 4 Project Manager ......................................
Words: 1268 - Pages: 6