Question

Technology Review Discussion: Research and report to the class on one of the following security technologies...

Technology Review Discussion: Research and report to the class on one of the following security technologies used to secure Industrial Control Systems: Application Whitelisting, Network segmentation, vulnerability scanning, network access control, Security Information and Event Management, Data diode.

Please cover in your post the following points:

Describe what the technology does.

Discuss whether you think it's a good fit for securing ICS and why.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Solution:-

Technology Review Discussion on Industrial Control Systems security :-

The industrial control systems and other business systems are using the IT technologies extensively. To achieve business goals and to perform fast and produce accurate IT technologies are used. In industrial control systems the IT technologies are used for the same purpose. But as the technology is used there are some side effects. Along with new facilities the new threats are emerged. In every organization the sensitive information and data is managed by automation and IT technologies so it is must to make them safe and secure. There comes the security.

Now we discuss about one of the security practice that is useful and beneficial for today's business and industrial systems. We discuss about the vulnerability scanning. Vulnerability is a point or weakness of the automation system from a malicious person or attacker can enter inside. By this the attacker can steal the important information and modify. So it is not good for any organization. For this we can perform vulnerability scanning.

Vulnerability scanning is aprocess of checking of the potential points from where attacker can enters the system and exploit on a computer or network to identify security holes. A vulnerability scan detects and classifies system weaknesses in computers, networks and communications equipment and predicts the effectiveness of countermeasures. A scan may be performed by an organization’s IT department or a security service provide, possibly as a condition imposed by some authority. An Approved Scanning Vendor, for example a service provider that is certified and authorized by the Payment Card Industry (PCI) to scan payment card networks. Vulnerability scans are also used by attackers looking for points of entry.

There are some tools available that performs the vulnerability scanning. A vulnerability scanner runs from the end point of the person inspecting the attack surface. The software compares details about the target attack surface to a database of information about known security holes in services and ports, anomalies in packet construction, and potential paths to exploitable programs or scripts. The scanner software attempts to exploit each vulnerability that is discovered. Running a vulnerability scan can pose its own risks as it is inherently intrusive on the target machine’s running code. As a result, the scan can cause issues such as errors and reboots, reducing productivity.

Mostly the two approaches are used to perform vulnerability scanning -

1) Authenticated scan -  In an authenticated scan, the tester logs in as a network user, revealing the vulnerabilities that are accessible to a trusted user, or an intruder that has gained access as a trusted user.

2) Unauthenticated scans - In the unauthenticated method, the tester performs the scan as an intruder would, without trusted access to the network. Such a scan reveals vulnerabilities that can be accessed without logging into the network.

An ideal vulnerability scanner has capabilities such as the following:

  • Maintenance of an up-to-date database of vulnerabilities.
  • Detection of genuine vulnerabilities without an excessive number of false positives.
  • Ability to conduct multiple scans simultaneously.
  • Ability to perform trend analyses and provide clear reports of the results.
  • Recommendations for countermeasures to eliminate discovered vulnerabilities.

If security holes are detected by a vulnerability scanner, a vulnerability disclosure may be required. The organization that discovers the vulnerability, or a responsible industry body such as the Computer Emergency Readiness Team (CERT), may make the disclosure, sometimes after alerting the vendor and allowing them a certain amount of time to remedy or mitigate the problem.

Advantages:-

1) Associated Benefits of Monthly Scans -

It is sometimes difficult to Creating a culture of security cbe but being proactive you will see many benefits of a periodically vulnerability scan.

2) Increased Awareness -

One way to increase security awareness at your business is to raise the specter of review and assessment often. When employees realize their systems will be monitored on an ongoing basis, they will buy-in to security protocols much faster.

3) System Assessment Results -

A periodically scan can sometimes found unknown problems or issues outside of a security concern. Vulnerability scanning can often slow down your network system.

4) Provides Actionable Insight -

A true vulnerability scan can provide insight into your system that your own IT staff or your IT consulting partner will be able to immediately take action on.

So this Security practice is very beneficial to the modern industrial control systems to wofk faster with improved security.

Add a comment
Know the answer?
Add Answer to:
Technology Review Discussion: Research and report to the class on one of the following security technologies...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • For your initial discussion post, you are to expand on the element review below. You need...

    For your initial discussion post, you are to expand on the element review below. You need to provide specific examples on what will be reviewed in the audit based on this element. Answer what will be included in the audit plan for this element. If possible, provide a link to another resource. Try not to pick an element already discussed by another student. In your response, provide your comments on the other students posts on their element and any additional...

  • You work for EGS Testing Solutions; your company is involved in testing related to access control...

    You work for EGS Testing Solutions; your company is involved in testing related to access control systems. A large, private fitness club contacted your company because their Web server was hacked. The fitness club has a corporate office with 50 workstations, 4 application servers, 2 e-mail servers, 2 Web servers, and 129 franchisees with 10 workstations and about 3,500 members at each location. Except for the equipment at the franchisees’ locations, all other equipment resides at the central headquarters. The...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • Which role has the PRIMARY responsibility for the documentation of control implementation? Systems security engineer Control...

    Which role has the PRIMARY responsibility for the documentation of control implementation? Systems security engineer Control assessor Information System Owner (ISO) Information Owner/Steward When making determinations regarding the adequacy of common controls for their respective systems, Information System Owner (ISO) refer to the Common Control Providers’ (CCP) Privacy Impact Assessment (PIA) Business Impact Analysis (BIA) Authorization Packages Vulnerability Scans An organization-wide approach to identifying common controls early in the Risk Management Framework (RMF) process does which of the following? Considers...

  • TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for...

    TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • IT's About Business 4.1 The Heartbleed Bug What Is Heartbleed? OpenSSL, an open-source software package, is...

    IT's About Business 4.1 The Heartbleed Bug What Is Heartbleed? OpenSSL, an open-source software package, is a popular type of transport layer security (TLS) software (discussed later in this chapter) that secures numerous websites around the world. Web servers use OpenSSL to encrypt sites. Such sites show up in browsers with a “lock” icon and the “https” prefix in the address bar. The encryption protects Internet sites offering banking, shopping, email, and other private communications. Roughly two out of three...

  • please read instructions on the first picture and follow it Discussion Board: Chapter 1 Due: Jun...

    please read instructions on the first picture and follow it Discussion Board: Chapter 1 Due: Jun 28, 2019 at 11:59 PM Please read the article titled Evolution of Operations Planning and Control: from production to supply chains In at least three paragraphs, describe how and why the focus of operations planning and control has changed over time. While one might argue that answers consisting of sentences quoted from articles do not represent plagiarism, I do not consider them acceptable, and...

  • please read instructions on the first picture and follow it Discussion Board: Chapter 1 Due: Jun...

    please read instructions on the first picture and follow it Discussion Board: Chapter 1 Due: Jun 28, 2019 at 11:59 PM Please read the article titled Evolution of Operations Planning and Control: from production to supply chains In at least three paragraphs, describe how and why the focus of operations planning and control has changed over time. While one might argue that answers consisting of sentences quoted from articles do not represent plagiarism, I do not consider them acceptable, and...

  • please I need this, step by step with formulas, avoid using excel. CASE 33 Security Software,...

    please I need this, step by step with formulas, avoid using excel. CASE 33 Security Software, Inc. communication in a highly secure and efficient process. The Market Security Software, Inc. (SSI) was a major provider of application software. The firm was proud to be the number two company in the enterprise firewall market. Firewalls ensure network Security for businesses by determining whether to approve or deny access to corporate networks and applications. They have security software that inspects com- munication...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT