Cyber Security Issues and Vulnerabilities
Your name
Institution name
Instructor's name
Course number
Date:
1. Outline XXX XXXXXXXXXXXXX XXXXXX and XXXXXXXXXXXXXXX of XXX XXXXXXXXXXXXX XXXXXXXX. Include in your answer specific XXXXXXX required XX XXXXXXX the security profile of this industry.
Today, XXXXX, individuals as XXXX XX XXXXXXX at large XXXX XXXX XXXXXXXXX because of XXXXXXXX XXXXX-XXXXXXXX issues XXXX XXXXXXXXXXX XXX XXXXXXXXXXXXX. Industrial safety systems, automation XXX XXXXXXX utilized in oil XXX XXX sector especially in petrochemical XXXXXXXX are being digitized XXX XXXXXXXXX on digital XXXXXXXXXX. Any activity performed in the petrochemical XXXXXXXX XX subject XX XXXXX which XXX XXXXXX caused XX XXX digital XXXXXXXXXXXXXXX XXX XXXXXXXX XXXXXXX. XXX networks used between controlling systems and XXXXXXX equipment are now being depending XX internet technology XXXX were previously XXXXXXXXXXX and XXXXXXXX. XXXX XXXXX XXXX XXXXX processing XXX XXXXXXXXXXX systems XXXX in XXXXXXXXXXXXX industry are XXXXXXXXXXX exposed to XXXXX XXXXXXXX XXXXXX XXX XXXXXXXXXXXXXXX (XXXXXXXX, 2017).
XXXXXXXXX XXX the XXXXX XXXXXXXX XXXXXX and vulnerabilities XXXX petrochemical XXXXXXXX may XXXX in case of a successful XXXXX-XXXXXX.
XXXXXX plant hardware is in danger XX XXXX XXXXXXX, XXXXXXXXX temperature and XXXXXX estimations. A XXXXXXXXXX XXXXX XXXXX false information XXXXXXXXX XXXXX XXX XXXX a XXXXXXXXX in XXX hardware in a remote office, driving XXX XXXXXX organization XX waste XXXX and financial resources XXXXXXXXXXXXX.XXXXXXX XXXXXXXXXX XXXX XXX XXXXXXXX XXX XXXXXXXXXXX are likewise XXXX to assault through XXXXXX XXX board XXXXXXXXXX. These XXXXXXXXXX XXXXXXXXX XXXXXXX XXXXXXX PLC XXXXXXX, and XXXXXXXXXXXXXXX can XX XXXXXXXX to make a blast just XX killing XXXXXXX XXXXXXXXXX, which BMS XXXXXXXXXX are in XXXXXX XX.XXXXXXXXXXXXXX XXXXX XXXX XXX advertise XXXXXXXXX by XXXXXXXXXXX XXXXXXXXXXX XXXX field gadgets and tank the XXXXX frameworks inside XXX XXXXXXXXXXXX's ERP XXXXXXXXXX, XXX altering XXXXXXXXXX XXXX XXXXXXX to oil in XXXXX.
There are certain XXXXXXX XXXXXXXX XX XXX XXXXXXXXXXX XXXXXXXXXXX to improve XXX XXXXXXXX XXXXXXX of petrochemical industry. XXXX should XXXXX functional XXXXXXXXXXXX stipulating that XXXXXXXX to digital vulnerabilities must be established. Computerized vulnerabilities XXXX be incorporated XXXX pertinent cyber XXXXXXXX XXXXXXXX. There XX a more XXXXXXXXX XXXXXXXXXXX for XXXXXXXXXX that XXXXXX XXX outcomes if an XXXXXXXXXXX XXXXXXXXXX XXX happened. XXXXX is a greater XXXX for XXXXXXXX that reduce the XXXXXXXXXXXX if an XXXXXXXX XXXXXXXX XXX XXXXXXXX. Most XXXXXXXXXXX, petrochemical organizations XXXX XXXXXX a culture XXX XXXXXXXX digital vulnerabilities in the XXXX XXX XX XXXXX XX a culture for controlling XX XXXX XX preventing explosions XXX XXXXX. XXXXXXXXX-XXXXXXXX work XXXX XX prioritized XXXX within XXX XXXXXX and in the XXXXXXX XXXXXX (XXXXXXXX, XXXX).
2. XXXXX Clarke’s assessment from chapter XXX XX XXXXX XXX: The Next Threats XX XXXXXXXX Security XXX What to XX XXXXX It, XXXXXXXX XXXXXXX’s potential XXXX XXXXXXXX XXX of “Offensive Cyberwar” to XXXXXX XXXXX nation’s infrastructure. XXXX free XX XXXXXXX ‘theoretical’ scenarios and XXX-XXXXXX actions that XXXXX best XXXXX our nation's efforts for XXXXXXXXXXXX a foe’s XXXXXXXX infrastructure.
The XXXXXX States is XXXXX XXXX an XXXXXXXXXX XXXXXXXXX XXXXX XX XXXXX XXXXXXXX threats XXXX XXXXXXXX their cyber space. XXXXX XXXXXXXX XXXXXXXX XXXXXXXX put in XXXXX XX XXX XXXXXXXXXX or XXXXXXXXXXXXX XX XXXXXXX their cyberspace, XXXXXXXX XXX XXXXXXXX XXXX XXXXXXXXX XXXXXX. XXX XXXX significant threats to cyber XXXXXXXX in the X.S include cyber XXXXXXX (XXXXX Espionage) and cybercrime (Clarke& XXXXX, 2010). XXX cyber warfare is a major XXXXXXXX XXXXXX XX X.S XXXXXXXXXX XXXXX XX XXXXXX perpetrated XX foreign military XXX XXXXXXXXXXXX XXXXXXXX. XXX X.S is facing XXXXXXXXX XXXXXXXXXXX XXXX XXXXXXX XXXXXXX who have shifted XXXXX XXXXXXXXXXX from XXXXXXXX XXX to XXXXX XXXXXXX (XXXXXX&XXX; XXXXX, 2010). XXX XXXXXXX XXXXXXXXXXXX XXXXXXXX XXXXXX XXXXXXX their XXXXXXXXXXXX gathering operations XX cyber XXXXX. XXXX XXX put the X.S cyberspace XXX XXXXXXXXXX information at risks from cyber-XXXXXXX. If incase the U.S XXXXX security XX compromised, the XXXXXXXXXX would XXXX losing vital information XX XXXXX XXXXXXX which XXX XX used against XXXX. The XXXXX XXXXXXXXX XX XXXXXXXXXXX XX adversaries XX gain XXXXXXXX, XXXXXXXXX and XXXXXXXX XXXXX.
Clarke and Knake pointed out in chapter six of XXX XXXX XXXX XXXXXXX XX XXXXX using offensive XXXXXXXX XX XXXXXX XXXXX countries infrastructure (XXXXXX& Knake, 2010). XXXXX, the XX XXXXXXX Force is XXXXXXXX XXXXXXXXX cyber XXX XXXXXXX XXXXXX the world. XXX country is penetrating XXX XXXXXXXXXX networks of foreign XXXXXXXXX XXX the XXXXXXX of XXXXXXXXX and getting them ready XXX an attack. XXX US Defense Force particularly XX creating internet XXXXXXX XXXX are XXXXXX-XXXXXXXX, pre-targeted, and XXXX XXX XXXXX XX XXXXXX another country’s piece XX electronic XXXXXXXXXXXXXX. This XX XXXXXXX XXXX XXXX to the target countries XXXX what the United XXXXXX is accusing XXXXXXX government XX doing to XXX XXXXXXX. United States XX XXXXXXXXXXXX XXXXXXX policies that XXX too costly XXX at the same XXXX XXXXXXXXXXXXX XXX are XXXXXXX XXXXXXXX XX a XXXXXXX XXXXXXXX. The XXXXXXX XX XXXXXXXX out XX fear XXX XXXXXXXXXXX other foreign XXXXXXXXX to XXXXXXX-XXXXXX out of fear. XX, XXXXXXX XX ensuring XXXXXXXXXX, it is favoring XXXXXXXXX actions.
The growing XXXXXXXXX XX XXXXX threat XXX XX mitigated XX XXXXXXXXXXXX effective XXXXXXXX XXXXX XXXXXXXX XXXXXXXX (Cilluffo, 2016). XXX strategy XXXX XXXXXX the XXXXXXXXXX to XXXXXX XXXXX XXXX goals which XX to anticipate, XXXXXX, XXXXXXX XXX XXXXXXXX cyber XXXXXXXX threats. To XXXX up XXXXXXXXX X.S strategy, I would suggest that XXX government XXXXXX XXXXXXXXX a national cyber XXXXXXXX response XXXX, which XXXXX XX tasked XXXX the XXXXXXX of monitoring cyber threats, XXXXXXXXXX risks, XXX responding XX cybercrime incidences. This XXXXXXX XXXXX XXXXXX XXXX XXX government XXX up XXXXXXXXX XXXXXXXX to XXXXX XXXXXXXXXX. I XXXXX also XXXXXXX that the government must invest XXXXXXX on cyber XXXXXXXX by allocating enough XXXXX that XXXXX be XXXXXXXX by XXXXXXXX XXXXXXXX XX XXXXXX XXXXXXXXXX threats. XXXXXXXX XXXXXXXXXX funding would foster XXXXXXXXXXXXX XXXXXXXXXXX XXXX capabilities XX cybercrime XXXXXXXX. XXXXXXX, I would XXXXXXX XXXX the government should XXXX XX XXXX XXXXXXXX programs for XXX XXXXXXXX XXXXXXXX to XXXXXX XXXX XXXXXX XXXXXXXX cyber threats. XXXXX XXXXXXXX XXXXXXXX would enable the XXXXXXXX XX effectively combat cybercrime XXX XXXXX Espionage.
References
Clarke, X X. &XXX; XXXXX, X. (XXXX).Cyber War: XXX Next XXXXXX to National XXXXXXXX XXX XXXX to Do. XXXXXXXXX XXXXXXXX://indianstrategicknowledgeonline.XXX/XXX/XXXXX%XXXXX%20-%20The%20Next%XXXXXXXX%XXXX%20National%20Security%20and%XXXXXX%XXXX%XXXX%XXXXXXX%XXXX%XX(Richard%XXX%20Clarke)%20(XXXX).pdf
XXXXXXXX, X.X. (2016). XXXXXXXX XXXXX Threats to the United XXXXXX. XXXXXX for Cyber XXX XXXXXXXX Security. XXXXXXXXX fromhttp://XXXX.house.XXX/meetings/XX/XXXX/XXXXXXXX/XXXXXX/HHRG-XXX-HM08-XXXXXX-XXXXXXXXX-XXXXXXXX.pdf
Polyakov, X. (XXXX, September 13). Cyber Security Risks To XX XXXXX Of In The XXX XXX Gas XXXXXXXXXX. XXXXXXXXX fromhttps://www.forbes.com/sites/XXXXXXXXXXXXXXXXX/XXXX/04/XX/XXXXX-XXXXXXXX-risks-to-XX-XXXXX-XX-in-the-oil-XXX-gas-industries/#XXXXXXXXXXXX