ICS and Wireless Sensor Network Security
Assessment Description
It is critical to understand how to secure key U.S. infrastructure and embedded systems that are employed within industrial infrastructures utilized in Supervisory Control and Data Acquisition (SCADA). A few notable examples include power generation, water treatment, and air handling systems. Keep in mind that Industrial Control Systems (ICS) use wireless technologies to transmit control signals and capture instrumentation telemetry and feedback.
Directions: In a 350- to 500-word paper, explore the following:
· Identify at least 3 pieces of key U.S. infrastructure controlled by ICS, including the related attack surface and vulnerabilities associated with each selected infrastructure.
· Distinguish the means for capturing instrument telemetry, feedback control data, and associated security risks.
· Suggest security controls (countermeasures) for mitigating these vulnerabilities and attacks.