Anti-Forensics

Anti-Forensics

Name:

Institution:

 

 

 

 

 

 

 

 

 

Anti-Forensics

Industrial Control Systems incorporate mechanisms to operate distribution, programming, and production of different items. Security of such networks is therefore more important than normal network security because they contain soft targets whose vulnerability to disruption is detrimental to the survival of large-scale plants thereby incurring huge losses (Weiss, 2010). They also have multiple pathways thereby comprising of interlinked networks hence single compromises affect the entire operation. As such, there is a severity matrix developed for their risk assessment using supervisory control and centralized data acquisition. For instance, they are linked to It networks for lesser isolation thus enhancing monitoring to detect anomalies (Zhang, 2010). Normal network security is different from ICS security because the latter employs Mean Failure Cost. It evaluates the computational basis for estimates regarding the availability of a system based on the loss that every stakeholder will sustain resulting from violations/breakdowns.

Anti-forensics are measures designed to negatively affect the availability, quality/amount of evidence of any wrongdoing within a system (Grimble, 2006). In normal network security environments, this technique involves data encryption to prevent hacking incidences. In Industrial Control Systems, anti-forensics is layered with network traffic protocols and customized operating system kernels that reverse the ability to access certain ports within the system. It is therefore laden with constrained devices with anti-logging capabilities, which make it difficult for conducting checks, or tampering with its operational cause (Grimble, 2001) The dynamic nature of the global industrial complex does not demand upgrading of current severity matrix to reduce anti-forensic effectiveness because that would be beneficial to the firms. This is due to the uncertainty surrounding the safety of the systems especially since technology keeps evolving. Preventing the compromise of such systems would therefore be a prudent move (Macaulay & Singer, 2012).

 

References

Grimble, M. J. (2001). Industrial Control Systems Design. Chichester [England: Wiley.

Grimble, M. J. (2006). Robust Industrial Control Systems: Optimal Design Approach for Polynomial Systems. Chichester: Wiley.

Macaulay, T., & Singer, B. (2012). Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS. Boca Raton, FL: CRC Press.

Weiss, J. (2010). Protecting Industrial Control Systems from Electronic Threats. New York: Momentum Press.

Zhang, P. (2010). Advanced Industrial Control Technology. Amsterdam: William Andrew/Elsevier.

 

 

 

 

 

 

Calculate your order
275 words
Total price: $0.00

Top-quality papers guaranteed

54

100% original papers

We sell only unique pieces of writing completed according to your demands.

54

Confidential service

We use security encryption to keep your personal data protected.

54

Money-back guarantee

We can give your money back if something goes wrong with your order.

Enjoy the free features we offer to everyone

  1. Title page

    Get a free title page formatted according to the specifics of your particular style.

  2. Custom formatting

    Request us to use APA, MLA, Harvard, Chicago, or any other style for your essay.

  3. Bibliography page

    Don’t pay extra for a list of references that perfectly fits your academic needs.

  4. 24/7 support assistance

    Ask us a question anytime you need to—we don’t charge extra for supporting you!

Calculate how much your essay costs

Type of paper
Academic level
Deadline
550 words

How to place an order

  • Choose the number of pages, your academic level, and deadline
  • Push the orange button
  • Give instructions for your paper
  • Pay with PayPal or a credit card
  • Track the progress of your order
  • Approve and enjoy your custom paper

Ask experts to write you a cheap essay of excellent quality

Place an order