Saturday, December 7, 2019

Threats & Vulnerabilities for PureLand Wastewater

Question: Describe about threats vulnerabilities for pure land wastewater. Answer: Threats Vulnerabilities for Pure Land Wastewater As per the analysis, there have been different threats and the vulnerabilities which are not reflecting any priority or the severity of the impacts. These are grouped under: The data The sensitivity of the PCS data has been never observed. It has a major secured information with the proper identification of the data into the category of sensitivity. The communication links are mainly to handle the secured connection with the database protection. (Tularam et al., 2011). The category of the vulnerability is based on the default configuration of the OS with the administration setup where there is no saving of the passwords as well as there have been indefinite platform setups and the passwords are not easily shares on this platform. The security administration For the handling of the different security policies, there is a need to include the integration and the effectiveness of the PCS which is basically directed to the security administration. The policy and the procedures are for implementation, operation and the maintenance. There has been effective policy and the security atrophies which direct to set the products of the security free legacy environment. (Gnaulis, 2007). There have been explorations based on the contribution for the security as well as training the staff for the costs and the other reasons. Architecture The architecture has been based on the including of the data storage and the controlling. There have been failure points which are not only for the vulnerability but also for the modern architecture. The security and the fire has been integrated into PCS with the different measurement and the control systems. (Stanley, 2011). The integration is mainly for compounding the potential for the intrusion as well as the disruption. Network The vulnerabilities depend on the system with the implementation relying on the protocol setup with the lower bandwidth of the channels of data. The configuration of the passwords have been effective with the technology setup like the Ethernet, routers and the firewalls. These have the vulnerability for the administrative deficiency along with insecure configuration and management of the PCS network. The major factor has been the connection between the PCS and the external network system. Platforms The analysis is based on setting proprietary and non-proprietary with the specifications like the remote telemetry units and the intelligent electronic devices with the measurement of the hardware. The devices have been set for the specialisation of the hardware with the set functionality with different operational requirements. (Gemail et al., 2011). The password control and the detection is mainly based on the accessing of the configurations to the RTUs (Remote telemetry units). These are mainly set for the development and the deployment of the program software. Reference Stanley States. (2011).Security and Emergency Planning for Water and Wastewater Utilities. American Water Works Association. Gemail, K. S., El-Shishtawy, A. M., El-Alfy, M., Ghoneim, M. F., El-Bary, M. A. (2011). Assessment of aquifer vulnerability to industrial waste water using resistivity measurements. A case study, along El-Gharbyia main drain, Nile Delta, Egypt.Journal of Applied Geophysics,75(1), 140-150. Ganoulis, J. (2007). Environmental And Human Security In The Mediterranean. InManaging Critical Infrastructure Risks(pp. 51-61). Springer Netherlands. Tularam, G. A., Properjohn, M. (2011). An investigation into modern water distribution network security: Risk and implications.Security Journ

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.