Introduction
Over the past decade, various state-industry initiatives have developed to handle critical infrastructure safety concerns. IT-ISAC remains, therefore, remains as the main passage to address infrastructure safety issues. As envisioned in the 63rd Presidential Division Directive, IT-ISAC should aid on a sectoral-centered the voluntary dissemination, analyzing, and collection of information to and from the federal government and industry sectors (Lewis, 2004). IT-ISAC related operations involve an emphasis on infrastructure threats, vulnerabilities as well as proper exercises for private sector institutions in selected sectors. Even though ultimately designed by 20 IT member firms, IT-ISAC got modeled on a mechanism such as the CDC which has overtime confirmed to be operational, especially in then wide-ranging exchanges with the non-federal and private sectors (Lewis, 2004). Simply put, IT-ISAC possesses a massive extent of technical expertise and focus, principally on non-law enforcement and non-regulatory missions. They develop a baseline pattern and statistics on several sectors, offers an archive for chronological data to get utilized by the private sector as perceived proper by the government and IT-ISAC (Common cyber-security vulnerabilities observed in control system assessments by the INL NSTB program, 2008). Of specific significance, IT-ISAC offers information concerning security events encountered by firms to the government.
SCADA is a system of hardware and software features that permits industrial organizations intended to:
- Record events into a log file
- Directly interrelate with devices such as motors, pumps, valves and sensors
- Process, gather, and monitor real-time data
- Manage industrial processes locally or at remote locations
SCADA structures are critical for industrialized institutions as they support to uphold proficiency, communicate systems concerns and process data for smarter decisions to aid lessen downtime. The basic SCADA design starts with remote terminal units (RTUs) and programmable logic controller (PLCs). RTUs and PLCs are microcomputers which communicate with a collection of entities such as devices, factory machineries and sensors and then direct the information from those entities to workstations with SCADA computer software package. SCADA programs displays, dispenses and processes the data, assisting employees and workers to evaluate the data (Braxton, 2013). For instance, the SCADA program speedily informs a company employee that a bunch of produce indicates a high occurrence of inaccuracies. The machinist can then recess the process and observes the SCADA coordination data through an HMI to define the reason of the concern. The capability of the SCADA program to report any malfunction assist companies to resolve the challenges and extra loss of the product (Braxton, 2013). Moreover, SCADA programs function properly in various enterprise types since they can spread out from simple configurations to massive and sophisticated installations. They form the cornerstone of numerous companies which include:
- Gas and Oil
- Beverage and Food
- Transportation and Energy
- Power and Manufacturing
These systems are a substantial component of not only the commercial groups but also most of the nation's crucial infrastructures under the mandate of the governmental agencies. For instance, Federal Bureau of Information Technology System comprises of the SCADA model which it uses to gather real-time statistics to maintain and operate the production of hydroelectric power, water distribution and maintain water storage (US Department of Homeland Security, 2009). The information and data gathered to support the bureau mission such as the relevant program objectives for instance flood control and dam protection as well as the ecological mitigation. Practically every SCADA thus operates properly as they are not only flexible but also reliable; however, the SCADA programs lack proper security measures. This deficiency in the SCADA programs bare the possibility of manipulation of operational date, initiate disturbances of crucial services and procedure redirection which can result in adverse consequences for the United States citizens. This can get averted through auditing of the general security of the crucial infrastructure throughout the whole lifecycle of the SCADA systems constituents.
The Connection between Sector-Specific Plan and National Infrastructure Protection Plan
National Infrastructure Protection Plan develops the supreme models pertinent to all the Critical Infrastructure and Key Resource segments detected within the 7th Presidential Command of Homeland Security. Similarly, Sector-Specific Plans offer details on the manner through which Critical Infrastructure and Key Resources task can get synchronized, created and adopted in the seventeen Critical Infrastructure and Key Resources Segments (US Department of Homeland Security, 2009). The plans continuously advance with the alteration in the types of threats leading the implementation of new programs. Since every segment contains distinctive concerns and matters, ideal tactics to safety differ across and within the Critical Infrastructure and Key Resource segments. The Sector-Specific Plans hence get designed to address the exceptional risk landscapes and characteristics of every segment as it also offers regularity for defensive resources, private safeguarding investments, and programs. The NIPP is a useful device for developing synchronization amid the private sector and the government centered on the design laid by 63rd Presidential Decision Directive that detects crucial sectors of the economy as well as task-related federal agencies to operate with them on strengthening responses and information sharing (US Department of Homeland Security, 2009).
The National Infrastructure Protection Plan gets modeled to build partnerships amid sector organizing committees from the private sector and federal management boards from the public sector for the entire eighteen segments which the DHS considers crucial (US Department of Homeland Security, 2009). For instance, the Agriculture and Food Sector-Specific Plan enclosed herein is a consequence of over 14 months of collaboration amongst the territorial, state, federal, tribal and local government institutions. These collaborations led to a document which depicts the sector's prevailing all-hazards resiliency strategies and protective posture and the setting that exemplifies a myriad of programs, resources, tools and initiatives which are applicable to the sectors partners to:
- Minimize the vulnerability of food resource
- Prevent threats to the sector
- Reduce the consequences from as well as help in the expansion of resiliency approaches to support the sector in recuperating from large-scale occasions
- Contribute to the documentation and application of risk mitigation actions
The Function of the Sector-Specific Plan
The Sector-Specific Plans purpose is to create priorities and goals for the segment tailored to address their existing environmental risk, for example, the demand to ensure continuity in a staff which is promptly imminent retirement age, risk related to outdated and aging infrastructure as well as climate alterations and the relationship between physical security and cyber security. Representing critical elements of national physical and economic safety, these segments comprise of services which citizens depend on in their routine lives such as communication, chemical, healthcare, financial, transportation, water, energy, food, and agriculture which are indispensable services necessary to withstand the economic strength as well as high living standards for the United States citizens (US Department of Homeland Security, 2009). However, my interest is to accentuate on specifically the transportation services contained in the Sector-Specific Plan since no person can overstate the prominence of transportation than label it a country's salvation. That said, the United States transport infrastructure is indisputably known to add efficiency and speed to the nation's progress as it enables the proper physical link between the urban and rural areas within the country attributed to the U.S. raid economic progress.
Despite boasting of having one of the largest global transport sectors, the U.S transport infrastructure also faces severa...
Cite this page
Examples of SCADA Protection Overlap Amongst the Corporate Groups and Governmental Agencies. (2022, May 17). Retrieved from https://proessays.net/essays/examples-of-scada-protection-overlap-amongst-the-corporate-groups-and-governmental-agencies
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- Analysis of a Professional of Mitch Kapor Essay
- System and Method of Mitigating Cyber Attack Risks Paper Example
- Essay Sample on Strategic Leadership and Big Data Phenomenon
- My Journey to Becoming a Computer Lover - Essay Sample
- Developing Cloud Apps: Knowledge, Experience, and Resilience - Essay Sample
- Essay Example on DDoS Attack: Flooding Systems With Malicious Traffic
- Essay Example on Digital Hacking: Growing Threats in the 21st Century