preview

Modelling Of Scada Networks By Implementing The Dbsy Modelling Method, And Risk Assessment

Decent Essays

IMPLICATION OF DBSY ON SCADA NETWORKS
RESEARCH ADVISORS: DR. PAVOL ZAVARSKY
SHIREESHA KATAM {skatam@student.concordia.ab.ca}- ID: 130526 DECEMBER 03, 2014
1 Research Statement
This research proposal is focused on modelling of SCADA networks by implementing the DBSy modelling method, and risk assessment.

2 Problem Statement
SCADA and ICS are the Critical Infrastructures, Which Operates a number of significant resources including fuel, energy, water, airports, and biotech and run many day-day utilities and services requirements [1]. This systems are also used in the production of goods and services which may consist of the manufacturing, managing, controlling monitoring. So the enterprises need a real time updates to allow a better …show more content…

• Suggest an appropriate controls to manage the risks

4 Resources
The following main documents will be the resources to conduct the proposed research.

Below are the key terms with their abbreviations that will be used in this proposal.

Terms Abbreviation
SCADA Supervisory control and data acquisition
NEC Network enabled capability
DBSy Domain based Security
IS1 HMG InfoSec Standard
HMI Human machine interface

5 Connection with course
Risk Management is a main aspect of information security as it acts as both the bedrock and umbrella to any proposed security control. This research is directly related to all of the three MISSM courses Disaster Recovery, Risk Management and Security Policies & Procedures. The research paper can give the best practices to be followed by any enterprise application architecture related organization towards implementing the best security practices.

6 Literature Review

6.1 SCADA Overview
Supervisory Control and Data acquisition systems are abbreviated as SCADA systems which plays a vital role national critical infrastructures like oil and gas, water, Power distribution, waste management, transportation systems. Cardenas, Amin, Huang, Lin & Sastry 2011 mentioned that these systems are used in the weapon systems, transportation management and even in health –care devises.

AS a result, there is accumulative interest in the forensics and security research community on SCADA systems. It is because of the governments

Get Access