Which of the following statements is true regarding Supervisory Control and Data Acquisition Networks?
a. Use of an application proxy, and remote log correlation and analysis are two ways to protect SCADA networks from attacks.
b. SCADA devices are becoming less widely used.
c. Because they are simple, these networks are not vulnerable to attacks.
d. An attack on a SCADA network cannot cause much damage, but may reduce efficiency of the systems they control.
Answer: a. Use of an application proxy, and remote log correlation and analysis are two ways to protect SCADA networks from attacks.
This is the right statement to state SCADA networks. The SCADA networks are responsible for the control and supervision of vital utilities such as power stations, railways, pipes. Considering the fact, they make use of standard protocols and are continually connected to an internet connection; it makes them exposed not only because ‘they’ lack a defense strategy but also from cyber-attacks. Securing the SCADA systems may require two methods like The Use of an Application Proxy and Analyzing Remote Logs for Anomalies. The other statements are not true . SCADA devices continue to be invariably present in the infrastructure, networks remain sophisticatedly designed and unsecure, with an attack could cause a severe destruction by disabling essential services.
Leave a Reply