Final paper

Running Head: THREATS & VULNERABILITIES 0




Threats & Vulnerabilities

Suresh Sevarthi

Lam Than

Wilmington University

03/31/2017












Threats & Vulnerabilities for the Pure_Land_wastewater:

As per analysis, there have been different threats and the vulnerabilities which are not reflecting any priority or the severity of the impacts. These are grouped under the following:

The Data:

The sensitivity of the PCS data has been never observed. It has a major secured information with the proper identification of the data into the category of sensitivity. The communication links are mainly to handle the secured connection with the database protection. The category of the vulnerability is based on the default configuration of the OS with the administration setup where there is no saving of the passwords as well as there have been indefinite platform setups and the passwords are not easily shares on this platform.

The security Administration:

For the handling of the different security policies, there is a need to include the integration and the effectiveness of the PCS which is basically directed to the security administration. The policy and the procedures are for implementation, operation and the maintenance. There has been effective policy and also the security atrophies that direct to line the products of the security free legacy environment. There are explorations based on the contribution for the security furthermore as training the workers for the prices and also the different reasons.

Architecture:

The architecture has been supported the together with of the info storage and also the controlling. There are failure points that aren't just for the vulnerability however also for the modern architecture. the security and also the fireplace has been integrated into PCS with the various measure and also the control systems. The combination is mainly for compounding the potential for the intrusion furthermore because the disruption.

Network:

The vulnerabilities rely upon the system with the implementation relying on the protocol setup with the lower bandwidth of the channels of data. The configuration of the passwords are effective with the technology setup just like the local area network, routers and also the firewalls. These have the vulnerability for the administrative deficiency beside insecure configuration and management of the PCS network. the main factor has been the connection between the PCS and also the external network system.

Platforms:

The analysis is based on setting proprietary and non-proprietary with the specifications just like the remote telemetry units and also the intelligent electronic devices with the measurement of the hardware. The devices are set for the specialisation of the hardware with the set functionality with totally different operational requirements. The password control and the detection is principally supported the accessing of the configurations to the RTUs--Remote telemetry units. These are in the main set for the development and the deployment of the program software.

Reference

Jason S, John D, and William Y (2011). common vulnerabilities in critical infrastructure control systems Sandia, National Laboratories Albuquerque, NM 87185-0785 22 May 2003.