SlideShare a Scribd company logo
1 of 3
Download to read offline
SCADA Networks is a supervisory control data acquisition network contains computers and
applications that perform in providing essential services and commodities like gasoline ,
electricity , natural gas , water waste treatment transportation etc to all americans as they are part
of national critical security as they require protection from threats that are present in cyber space
and this network is widely used but it is very weak in providing security to the required
information and scada networks are harmful that could result in public safety concerns .
There are 21 steps to improve cyber security in scada networks -
1)identify all connections to the scada networks
2) disconnect unnecessary connections to the scada network
3)evaluate and strengthen the security of any remaining connections to the scada network
4)harden scada networks by removing or disabling unnecessary services .
5) do not rely on properietry protocols to protect your system
6)implement the security features provided by the system and system vendors
7) establish strong controls over any medium that is used as backdoor into the scada network
8) implement internal external intrusion detection systems and establish 24 hour day incident
monitoring
9) perform technical audits of scada devices and networks and any other connected networks to
identify security concerns
10) conduct physical security surveys and asses all remote sites connected to the scada network
to evaluate the security .
11) establish scada red teams to identify and evaluate possible attack scenarios
12) clearly define cyber security roles , responsibilities and authorities for managers , system
administrators and users
13) document network archietecture
14) eastablish rigorous and ongoing risk management process
15)establish network protection strategy
16) clearly certify cyber security requirements
17) establish effective configuration management process
18) condect routine self assessments
19) establish system backups and disastor recovery plans
20)senior organization leadership should establish expectations for cyber security performances
21) eastablish policies
Among these 21 steps to improve cyber security in scada network the 8th step ie
IMPLEMENT INTERNAL AND EXTERNAL INTRUSION DETECTION SYSTEM AND
ESTABLISH 24 HOUR A DAY INCIDENT MONITORING - the security scanner can correlate
events from a wide variety of network intrusion detection system and the correlation includes
real time vulnerablity to event correlation such that only intrusion detection system which target
vulnerable servers are alerted on and it also include pre asset analysis such that all IDS events
going to or from a particular asset group are considered this makes analysis of any threat to a
specific scada network much easier lastly the log correlation engine can also accept logs from
many different NIDS as well as other sources of data include netflow , network monitoring ,
firewall logs and application logs and the LCE perform anomaly detection on the logs and search
for changes in behaviour traditional which NIDA miss . and real world example for IDS and
NIDS ie intrusion detection systems can be used in potecting the networks from traffics by using
signature based detection in networks based on ids monitor packets in network and compares
with the predetermined attack patterns known as signatures and this can be used in organizations
and in our houses we can use intrusion detection methods by using alarms if any intruder entered
into the house then we get alarm signal so that it can make owner of the house to be carefull and
active .
Solution
SCADA Networks is a supervisory control data acquisition network contains computers and
applications that perform in providing essential services and commodities like gasoline ,
electricity , natural gas , water waste treatment transportation etc to all americans as they are part
of national critical security as they require protection from threats that are present in cyber space
and this network is widely used but it is very weak in providing security to the required
information and scada networks are harmful that could result in public safety concerns .
There are 21 steps to improve cyber security in scada networks -
1)identify all connections to the scada networks
2) disconnect unnecessary connections to the scada network
3)evaluate and strengthen the security of any remaining connections to the scada network
4)harden scada networks by removing or disabling unnecessary services .
5) do not rely on properietry protocols to protect your system
6)implement the security features provided by the system and system vendors
7) establish strong controls over any medium that is used as backdoor into the scada network
8) implement internal external intrusion detection systems and establish 24 hour day incident
monitoring
9) perform technical audits of scada devices and networks and any other connected networks to
identify security concerns
10) conduct physical security surveys and asses all remote sites connected to the scada network
to evaluate the security .
11) establish scada red teams to identify and evaluate possible attack scenarios
12) clearly define cyber security roles , responsibilities and authorities for managers , system
administrators and users
13) document network archietecture
14) eastablish rigorous and ongoing risk management process
15)establish network protection strategy
16) clearly certify cyber security requirements
17) establish effective configuration management process
18) condect routine self assessments
19) establish system backups and disastor recovery plans
20)senior organization leadership should establish expectations for cyber security performances
21) eastablish policies
Among these 21 steps to improve cyber security in scada network the 8th step ie
IMPLEMENT INTERNAL AND EXTERNAL INTRUSION DETECTION SYSTEM AND
ESTABLISH 24 HOUR A DAY INCIDENT MONITORING - the security scanner can correlate
events from a wide variety of network intrusion detection system and the correlation includes
real time vulnerablity to event correlation such that only intrusion detection system which target
vulnerable servers are alerted on and it also include pre asset analysis such that all IDS events
going to or from a particular asset group are considered this makes analysis of any threat to a
specific scada network much easier lastly the log correlation engine can also accept logs from
many different NIDS as well as other sources of data include netflow , network monitoring ,
firewall logs and application logs and the LCE perform anomaly detection on the logs and search
for changes in behaviour traditional which NIDA miss . and real world example for IDS and
NIDS ie intrusion detection systems can be used in potecting the networks from traffics by using
signature based detection in networks based on ids monitor packets in network and compares
with the predetermined attack patterns known as signatures and this can be used in organizations
and in our houses we can use intrusion detection methods by using alarms if any intruder entered
into the house then we get alarm signal so that it can make owner of the house to be carefull and
active .

More Related Content

Similar to SCADA Networks is a supervisory control data acquisition network con.pdf

A SCALABLE MONITORING SYSTEM FOR SOFTWARE DEFINED NETWORKS
A SCALABLE MONITORING SYSTEM FOR SOFTWARE DEFINED NETWORKSA SCALABLE MONITORING SYSTEM FOR SOFTWARE DEFINED NETWORKS
A SCALABLE MONITORING SYSTEM FOR SOFTWARE DEFINED NETWORKS
ijdpsjournal
 
Critical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems WorldwideCritical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems Worldwide
Angela Hays
 
Steps to Improve Cyber Security of SCADA Networks by U.S. Department of Energy
Steps to Improve Cyber Security of SCADA Networks by U.S. Department of EnergySteps to Improve Cyber Security of SCADA Networks by U.S. Department of Energy
Steps to Improve Cyber Security of SCADA Networks by U.S. Department of Energy
Muhammad FAHAD
 
Creating a Reliable and Secure Advanced Distribution Management System
Creating a Reliable and Secure Advanced Distribution Management SystemCreating a Reliable and Secure Advanced Distribution Management System
Creating a Reliable and Secure Advanced Distribution Management System
Schneider Electric
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
Patricia M Watson
 
Defending against industrial malware
Defending against industrial malwareDefending against industrial malware
Defending against industrial malware
Ayed Al Qartah
 

Similar to SCADA Networks is a supervisory control data acquisition network con.pdf (20)

A SCALABLE MONITORING SYSTEM FOR SOFTWARE DEFINED NETWORKS
A SCALABLE MONITORING SYSTEM FOR SOFTWARE DEFINED NETWORKSA SCALABLE MONITORING SYSTEM FOR SOFTWARE DEFINED NETWORKS
A SCALABLE MONITORING SYSTEM FOR SOFTWARE DEFINED NETWORKS
 
Critical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems WorldwideCritical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems Worldwide
 
Steps to Improve Cyber Security of SCADA Networks by U.S. Department of Energy
Steps to Improve Cyber Security of SCADA Networks by U.S. Department of EnergySteps to Improve Cyber Security of SCADA Networks by U.S. Department of Energy
Steps to Improve Cyber Security of SCADA Networks by U.S. Department of Energy
 
Dr Dev Kambhampati | DOE- Steps to Improve Cybersecurity of SCADA Networks
Dr Dev Kambhampati | DOE- Steps to Improve Cybersecurity of SCADA NetworksDr Dev Kambhampati | DOE- Steps to Improve Cybersecurity of SCADA Networks
Dr Dev Kambhampati | DOE- Steps to Improve Cybersecurity of SCADA Networks
 
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
 
A Combination of the Intrusion Detection System and the Open-source Firewall ...
A Combination of the Intrusion Detection System and the Open-source Firewall ...A Combination of the Intrusion Detection System and the Open-source Firewall ...
A Combination of the Intrusion Detection System and the Open-source Firewall ...
 
Creating a Reliable and Secure Advanced Distribution Management System
Creating a Reliable and Secure Advanced Distribution Management SystemCreating a Reliable and Secure Advanced Distribution Management System
Creating a Reliable and Secure Advanced Distribution Management System
 
Scada security webinar 2012
Scada security webinar 2012Scada security webinar 2012
Scada security webinar 2012
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18
 
IJSRED-V2I2P15
IJSRED-V2I2P15IJSRED-V2I2P15
IJSRED-V2I2P15
 
A Cyber Infrastructure SCADA Testbed Environment for Research on the Nation\'...
A Cyber Infrastructure SCADA Testbed Environment for Research on the Nation\'...A Cyber Infrastructure SCADA Testbed Environment for Research on the Nation\'...
A Cyber Infrastructure SCADA Testbed Environment for Research on the Nation\'...
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi Security
 
SCADAShield-Datasheet
SCADAShield-DatasheetSCADAShield-Datasheet
SCADAShield-Datasheet
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
White paper scada (2)
White paper scada (2)White paper scada (2)
White paper scada (2)
 
Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...
Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...
Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...
 
P1111141868
P1111141868P1111141868
P1111141868
 
SDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same CoinSDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same Coin
 
Defending against industrial malware
Defending against industrial malwareDefending against industrial malware
Defending against industrial malware
 
Cisco network management
Cisco network managementCisco network management
Cisco network management
 

More from info382133

1.) Main characteristics of Haloarchaea are as followsHalophiles .pdf
1.) Main characteristics of Haloarchaea are as followsHalophiles .pdf1.) Main characteristics of Haloarchaea are as followsHalophiles .pdf
1.) Main characteristics of Haloarchaea are as followsHalophiles .pdf
info382133
 
1. The three bacteria that may be implicated in the given case are S.pdf
1. The three bacteria that may be implicated in the given case are S.pdf1. The three bacteria that may be implicated in the given case are S.pdf
1. The three bacteria that may be implicated in the given case are S.pdf
info382133
 
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
info382133
 
1. Activation of Vit. D involves Kidney and Liver and liver is part .pdf
1. Activation of Vit. D involves Kidney and Liver and liver is part .pdf1. Activation of Vit. D involves Kidney and Liver and liver is part .pdf
1. Activation of Vit. D involves Kidney and Liver and liver is part .pdf
info382133
 
Water is the most used resource in our day to day life . When the wa.pdf
Water is the most used resource in our day to day life . When the wa.pdfWater is the most used resource in our day to day life . When the wa.pdf
Water is the most used resource in our day to day life . When the wa.pdf
info382133
 
The initiation of the sporulation of the bacteria is a complex cellu.pdf
The initiation of the sporulation of the bacteria is a complex cellu.pdfThe initiation of the sporulation of the bacteria is a complex cellu.pdf
The initiation of the sporulation of the bacteria is a complex cellu.pdf
info382133
 
The emissivity of a given surface is the measure of its ability to e.pdf
The emissivity of a given surface is the measure of its ability to e.pdfThe emissivity of a given surface is the measure of its ability to e.pdf
The emissivity of a given surface is the measure of its ability to e.pdf
info382133
 
ANSWER Accounting concepts and conventions In dr.pdf
                     ANSWER Accounting concepts and conventions  In dr.pdf                     ANSWER Accounting concepts and conventions  In dr.pdf
ANSWER Accounting concepts and conventions In dr.pdf
info382133
 

More from info382133 (20)

1.) Main characteristics of Haloarchaea are as followsHalophiles .pdf
1.) Main characteristics of Haloarchaea are as followsHalophiles .pdf1.) Main characteristics of Haloarchaea are as followsHalophiles .pdf
1.) Main characteristics of Haloarchaea are as followsHalophiles .pdf
 
1. The three bacteria that may be implicated in the given case are S.pdf
1. The three bacteria that may be implicated in the given case are S.pdf1. The three bacteria that may be implicated in the given case are S.pdf
1. The three bacteria that may be implicated in the given case are S.pdf
 
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
 
1. Activation of Vit. D involves Kidney and Liver and liver is part .pdf
1. Activation of Vit. D involves Kidney and Liver and liver is part .pdf1. Activation of Vit. D involves Kidney and Liver and liver is part .pdf
1. Activation of Vit. D involves Kidney and Liver and liver is part .pdf
 
Rf = (distance the spot traveled)L there are fou.pdf
                     Rf = (distance the spot traveled)L there are fou.pdf                     Rf = (distance the spot traveled)L there are fou.pdf
Rf = (distance the spot traveled)L there are fou.pdf
 
No. Since sodium chloride is an ionic compound, i.pdf
                     No. Since sodium chloride is an ionic compound, i.pdf                     No. Since sodium chloride is an ionic compound, i.pdf
No. Since sodium chloride is an ionic compound, i.pdf
 
Nacl is highly ionic in nature. where as CaO is s.pdf
                     Nacl is highly ionic in nature. where as CaO is s.pdf                     Nacl is highly ionic in nature. where as CaO is s.pdf
Nacl is highly ionic in nature. where as CaO is s.pdf
 
it is reduced as it accepts e- and goes from 0 to.pdf
                     it is reduced as it accepts e- and goes from 0 to.pdf                     it is reduced as it accepts e- and goes from 0 to.pdf
it is reduced as it accepts e- and goes from 0 to.pdf
 
Iodine test is used to see if a compound has star.pdf
                     Iodine test is used to see if a compound has star.pdf                     Iodine test is used to see if a compound has star.pdf
Iodine test is used to see if a compound has star.pdf
 
I have no clue! .pdf
                     I have no clue!                                  .pdf                     I have no clue!                                  .pdf
I have no clue! .pdf
 
C only III is major product .pdf
                     C only III is major product                      .pdf                     C only III is major product                      .pdf
C only III is major product .pdf
 
Borane-THF is flammable and highly reactive with .pdf
                     Borane-THF is flammable and highly reactive with .pdf                     Borane-THF is flammable and highly reactive with .pdf
Borane-THF is flammable and highly reactive with .pdf
 
Ubiquity Internet is available everywhere namely at home, at work v.pdf
Ubiquity Internet is available everywhere namely at home, at work v.pdfUbiquity Internet is available everywhere namely at home, at work v.pdf
Ubiquity Internet is available everywhere namely at home, at work v.pdf
 
Water is the most used resource in our day to day life . When the wa.pdf
Water is the most used resource in our day to day life . When the wa.pdfWater is the most used resource in our day to day life . When the wa.pdf
Water is the most used resource in our day to day life . When the wa.pdf
 
The initiation of the sporulation of the bacteria is a complex cellu.pdf
The initiation of the sporulation of the bacteria is a complex cellu.pdfThe initiation of the sporulation of the bacteria is a complex cellu.pdf
The initiation of the sporulation of the bacteria is a complex cellu.pdf
 
The emissivity of a given surface is the measure of its ability to e.pdf
The emissivity of a given surface is the measure of its ability to e.pdfThe emissivity of a given surface is the measure of its ability to e.pdf
The emissivity of a given surface is the measure of its ability to e.pdf
 
Power set={SolutionPower set={.pdf
Power set={SolutionPower set={.pdfPower set={SolutionPower set={.pdf
Power set={SolutionPower set={.pdf
 
bro Solutionbro .pdf
bro Solutionbro .pdfbro Solutionbro .pdf
bro Solutionbro .pdf
 
ANSWER Accounting concepts and conventions In dr.pdf
                     ANSWER Accounting concepts and conventions  In dr.pdf                     ANSWER Accounting concepts and conventions  In dr.pdf
ANSWER Accounting concepts and conventions In dr.pdf
 
As ions are charged species a strong interactions.pdf
                     As ions are charged species a strong interactions.pdf                     As ions are charged species a strong interactions.pdf
As ions are charged species a strong interactions.pdf
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
fonyou31
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
 

Recently uploaded (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 

SCADA Networks is a supervisory control data acquisition network con.pdf

  • 1. SCADA Networks is a supervisory control data acquisition network contains computers and applications that perform in providing essential services and commodities like gasoline , electricity , natural gas , water waste treatment transportation etc to all americans as they are part of national critical security as they require protection from threats that are present in cyber space and this network is widely used but it is very weak in providing security to the required information and scada networks are harmful that could result in public safety concerns . There are 21 steps to improve cyber security in scada networks - 1)identify all connections to the scada networks 2) disconnect unnecessary connections to the scada network 3)evaluate and strengthen the security of any remaining connections to the scada network 4)harden scada networks by removing or disabling unnecessary services . 5) do not rely on properietry protocols to protect your system 6)implement the security features provided by the system and system vendors 7) establish strong controls over any medium that is used as backdoor into the scada network 8) implement internal external intrusion detection systems and establish 24 hour day incident monitoring 9) perform technical audits of scada devices and networks and any other connected networks to identify security concerns 10) conduct physical security surveys and asses all remote sites connected to the scada network to evaluate the security . 11) establish scada red teams to identify and evaluate possible attack scenarios 12) clearly define cyber security roles , responsibilities and authorities for managers , system administrators and users 13) document network archietecture 14) eastablish rigorous and ongoing risk management process 15)establish network protection strategy 16) clearly certify cyber security requirements 17) establish effective configuration management process 18) condect routine self assessments 19) establish system backups and disastor recovery plans 20)senior organization leadership should establish expectations for cyber security performances 21) eastablish policies Among these 21 steps to improve cyber security in scada network the 8th step ie IMPLEMENT INTERNAL AND EXTERNAL INTRUSION DETECTION SYSTEM AND ESTABLISH 24 HOUR A DAY INCIDENT MONITORING - the security scanner can correlate
  • 2. events from a wide variety of network intrusion detection system and the correlation includes real time vulnerablity to event correlation such that only intrusion detection system which target vulnerable servers are alerted on and it also include pre asset analysis such that all IDS events going to or from a particular asset group are considered this makes analysis of any threat to a specific scada network much easier lastly the log correlation engine can also accept logs from many different NIDS as well as other sources of data include netflow , network monitoring , firewall logs and application logs and the LCE perform anomaly detection on the logs and search for changes in behaviour traditional which NIDA miss . and real world example for IDS and NIDS ie intrusion detection systems can be used in potecting the networks from traffics by using signature based detection in networks based on ids monitor packets in network and compares with the predetermined attack patterns known as signatures and this can be used in organizations and in our houses we can use intrusion detection methods by using alarms if any intruder entered into the house then we get alarm signal so that it can make owner of the house to be carefull and active . Solution SCADA Networks is a supervisory control data acquisition network contains computers and applications that perform in providing essential services and commodities like gasoline , electricity , natural gas , water waste treatment transportation etc to all americans as they are part of national critical security as they require protection from threats that are present in cyber space and this network is widely used but it is very weak in providing security to the required information and scada networks are harmful that could result in public safety concerns . There are 21 steps to improve cyber security in scada networks - 1)identify all connections to the scada networks 2) disconnect unnecessary connections to the scada network 3)evaluate and strengthen the security of any remaining connections to the scada network 4)harden scada networks by removing or disabling unnecessary services . 5) do not rely on properietry protocols to protect your system 6)implement the security features provided by the system and system vendors 7) establish strong controls over any medium that is used as backdoor into the scada network 8) implement internal external intrusion detection systems and establish 24 hour day incident monitoring 9) perform technical audits of scada devices and networks and any other connected networks to identify security concerns 10) conduct physical security surveys and asses all remote sites connected to the scada network
  • 3. to evaluate the security . 11) establish scada red teams to identify and evaluate possible attack scenarios 12) clearly define cyber security roles , responsibilities and authorities for managers , system administrators and users 13) document network archietecture 14) eastablish rigorous and ongoing risk management process 15)establish network protection strategy 16) clearly certify cyber security requirements 17) establish effective configuration management process 18) condect routine self assessments 19) establish system backups and disastor recovery plans 20)senior organization leadership should establish expectations for cyber security performances 21) eastablish policies Among these 21 steps to improve cyber security in scada network the 8th step ie IMPLEMENT INTERNAL AND EXTERNAL INTRUSION DETECTION SYSTEM AND ESTABLISH 24 HOUR A DAY INCIDENT MONITORING - the security scanner can correlate events from a wide variety of network intrusion detection system and the correlation includes real time vulnerablity to event correlation such that only intrusion detection system which target vulnerable servers are alerted on and it also include pre asset analysis such that all IDS events going to or from a particular asset group are considered this makes analysis of any threat to a specific scada network much easier lastly the log correlation engine can also accept logs from many different NIDS as well as other sources of data include netflow , network monitoring , firewall logs and application logs and the LCE perform anomaly detection on the logs and search for changes in behaviour traditional which NIDA miss . and real world example for IDS and NIDS ie intrusion detection systems can be used in potecting the networks from traffics by using signature based detection in networks based on ids monitor packets in network and compares with the predetermined attack patterns known as signatures and this can be used in organizations and in our houses we can use intrusion detection methods by using alarms if any intruder entered into the house then we get alarm signal so that it can make owner of the house to be carefull and active .