Sunday, December 22, 2019
Modelling Of Scada Networks By Implementing The Dbsy...
IMPLICATION OF DBSY ON SCADA NETWORKS RESEARCH ADVISORS: DR. PAVOL ZAVARSKY SHIREESHA KATAM {skatam@student.concordia.ab.ca}- ID: 130526 DECEMBER 03, 2014 1 Research Statement This research proposal is focused on modelling of SCADA networks by implementing the DBSy modelling method, and risk assessment. 2 Problem Statement SCADA and ICS are the Critical Infrastructures, Which Operates a number of significant resources including fuel, energy, water, airports, and biotech and run many day-day utilities and services requirements [1]. This systems are also used in the production of goods and services which may consist of the manufacturing, managing, controlling monitoring. So the enterprises need a real time updates to allow a better†¦show more content†¦Ã¢â‚¬ ¢ Suggest an appropriate controls to manage the risks 4 Resources The following main documents will be the resources to conduct the proposed research. Below are the key terms with their abbreviations that will be used in this proposal. Terms Abbreviation SCADA Supervisory control and data acquisition NEC Network enabled capability DBSy Domain based Security IS1 HMG InfoSec Standard HMI Human machine interface 5 Connection with course Risk Management is a main aspect of information security as it acts as both the bedrock and umbrella to any proposed security control. This research is directly related to all of the three MISSM courses Disaster Recovery, Risk Management and Security Policies Procedures. The research paper can give the best practices to be followed by any enterprise application architecture related organization towards implementing the best security practices. 6 Literature Review 6.1 SCADA Overview Supervisory Control and Data acquisition systems are abbreviated as SCADA systems which plays a vital role national critical infrastructures like oil and gas, water, Power distribution, waste management, transportation systems. Cardenas, Amin, Huang, Lin Sastry 2011 mentioned that these systems are used in the weapon systems, transportation management and even in health –care devises. AS a result, there is accumulative interest in the forensics and security research community on SCADA systems. It is because of the governments
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.