0% found this document useful (0 votes)
163 views1 page

Network Architecture

Uploaded by

raksha.apple
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
163 views1 page

Network Architecture

Uploaded by

raksha.apple
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd

2.2.

2 Insecure Network Architecture


The network architecture design is critical in offering the appropriate amount of segmentation
between the Internet, the company’s corporate network, and the SCADA network. Network
architecture weaknesses can increase the risk that a compromise from the Internet could ultimately
result in compromise of the SCADA system. Some common architectural weaknesses include the
following:
 Configuration of file transfer protocol (FTP), web, and e-mail servers sometimes
inadvertently and unnecessarily provides internal corporate network access.
 Network connections with corporate partners are not secured by firewall, IDS, or virtual
private network (VPN) systems consistent with other networks
 Dial-up modem access is authorized unnecessarily and maintenance dial-ups often fail to
implement corporate dial access policies
 Firewalls and other network access control mechanisms are not implemented internally,
leaving little to no separation between different network segments

Control Systems Are Connected to Other Networks: Enterprises often integrate their control systems
with their enterprise networks. This increased connectivity has significant advantages, including providing
decision makers with access to real-time information and allowing engineers to monitor and control the
process control system from different points on the enterprise network. In addition, the enterprise networks
are often connected to the networks of strategic partners and to the Internet. Furthermore, control systems
are increasingly using wide area networks and the Internet to transmit data to their remote or local stations
and individual devices. This convergence of control networks with public and enterprise networks
potentially exposes the control systems to additional security vulnerabilities. Unless appropriate security
controls are deployed in the enterprise network and the control system network, breaches in enterprise
security can affect the operation of control systems.

You might also like