Module 9 Incident Response Lesson Objectives 9.1
1 / 1

Module 9 Incident Response Lesson Objectives 9.1

Author : ellena-manuel | Published Date : 2025-08-13

Description: Module 9 Incident Response Lesson Objectives 91 Identify some common types of incidents that may occur in SCADAICS systems 92 Identify the phases of an Incident Response as described in NIST SP 80061 93 Define incident containment

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "Module 9 Incident Response Lesson Objectives 9.1" is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Transcript:Module 9 Incident Response Lesson Objectives 9.1:
Module 9 Incident Response Lesson Objectives 9.1 Identify some common types of incidents that may occur in SCADA/ICS systems. 9.2 Identify the phases of an Incident Response, as described in NIST SP 800-61. 9.3 Define incident containment and describe how it is applied to an incident. 9.4 Identify the components of an Incident Response Plan. 9.5 Identify the 14 response core capabilities covered in the National Response Framework. SCADA/ICS Common Incidents NIST SP 800-82 Guide to Industrial Control Systems (ICS) Security, describes three broad categories of ICS incidents: Intentional targeted attacks, such as gaining unauthorized access to files, performing a DoS, or spoofing emails (i.e., forging the sender’s identity for an email) Unintentional consequences or collateral damage from worms, viruses, or control system failures Unintentional internal security consequences, such as inappropriate testing of operational systems or unauthorized system configuration changes Of the three, targeted attacks are the least frequent but the most damaging. Example of Intentional Attack Maroochy Water Services Incident. In the spring of 2000, a former employee of an Australian organization that develops manufacturing software applied for a job with the local government but was rejected. Over a two-month period, the disgruntled rejected employee reportedly used a radio transmitter on as many as 46 occasions to remotely break into the controls of a sewage treatment system. He altered electronic data for particular sewerage pumping stations and caused malfunctions in their operations, ultimately releasing about 264,000 gallons of raw sewage into nearby rivers and parks. — NIST SP 800-82 Example of Unintentional Consequences Davis-Besse. In August 2003, the Nuclear Regulatory Commission confirmed that in January 2003, the Microsoft SQL Server worm known as Slammer infected a private computer network at the idled Davis-Besse nuclear power plant in Oak Harbor, Ohio, disabling a safety monitoring system for nearly five hours. In addition, the plant’s process computer failed, and it took about six hours for it to become available again. Slammer reportedly also affected communications on the control networks of at least five other utilities by propagating so quickly that control system traffic was blocked. — NIST SP 800-82 Example of Unintentional Internal Security Consequences Penetration testing incident. A natural gas utility hired an IT security consulting organization to conduct penetration testing on its corporate IT network. The consulting organization carelessly ventured into a part of the network that was directly connected to the SCADA system. The penetration test locked up

Download Document

Here is the link to download the presentation.
"Module 9 Incident Response Lesson Objectives 9.1"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Presentations