21 August, 2019

CYBER SECURITY RISK ASSESSMENT METHOD FOR SCADA SYSTEM

Nazmul Hossain


Nowadays supervisory control and data acquisition (SCADA) is very important for control large system like pipeline, industrial manufacture, power plant as well as in the communication system. For controlling a large system by making human machine interface (HMI) its need to connect over a network like WAN or internet. So the SCADA system involves an issue called cyber security. The current situation with supervisory control and information procurement (SCADA) framework security is not similar with the vulnerabilities, dangers as on today and potential results.

A large number of the SCADA frameworks are moderately shaky frameworks with endless and inescapable vulnerabilities. Seen data security dangers are once in a while talked about and assessed at administration level. Data security part of PC controlled basic foundations must be basically broke down. PC controlled foundations ought to be subjected to an extreme investigation. Challenges for SCADA framework security are examined in this paper. Suggestions have been made to fortify the safety efforts at PC controlled basic foundations like savvy matrix, transportation control, water circulation and others. These suggestions, when executed, will cut down essentially the danger of disappointment at basic foundations.

In this research we most survey diverse dangers states and their effect on Supervisory Control and Data Acquisition (SCADA framework). We likewise audit diverse philosophy in digital security hazard appraisal for SCADA framework. We examination distinctive dangers and place them into various classes. We additionally portray diverse hazard appraisal techniques, their points, applications, effect on up and coming dangers, contrast and distinctive strategies. We additionally investigate distinctive parts of helplessness in the framework. In this paper, we propose a risk assessment method which includes system analysis, attack modelling and analysis, penetrate the system. This will show the impact on the system. Finally countermeasures are identified for improvement of the cyber security.