1. Seismic imaging is the process of synthesizing the wealth of subsurface information available from reflection seismic experiments by recording ambient sound with an array of geophones distributed at the surface. It is a tool that bounces sound waves off underground rock structures to reveal possible crude oil and natural gas. The geophones are used to record the sound waves where they echo within the earth. Petroleum geologists seek to calculate the depth and structures of buried geologic formations based on these echoes. It helps them identify oil and gas bearing reservoirs hidden beneath the earth's surface. Chevron used their modeling and analytics to exploit deep water drilling and hydrocarbon extraction in areas with challenging geographies (Artman, 2005).
2. Ozturk and Aubin (2011) mention there are several security vulnerabilities associated with SCADA such as the networking of control systems where breaches in enterprise security can arise if appropriate security controls are not put in place for both networks. Insecure remote connections,
…show more content…
Secondly, Flexibility, where with cloud computing, because you only pay for what you use, you have the flexibility to only use what you need which is very flexible to expand with your business growth. Thirdly, cloud computing is very simple, fast and easy. Any software in your business can be moved out of your shop and into the cloud that will give you the ability to focus on what you do best in your business and excel at your strengths while someone else handles the administrative functions. Fourthly, anywhere if you want you can access your cloud based applications that make more accessible. Fifth, Natural disaster or something like that can strike your business but the good news is that your computing capability resides somewhere else (Help desk llc,
if an attacker manages to enter the SCADA network, it will be difficult to carry out any sort of attack. The monitoring
All types of business models can find benefits from cloud computing infrastructure. As for example cost and flexibility from small business viewpoint whereas total IT problems can be solved for large companies. It will add advantages for companies, their employees, consumers, distributor where the overall business solution can be provided.
For security and privacy, cloud computing is the safest because it uses X.509 certification. X 509 is a digital certificate issued by an authority. The next question is: do you trust this authority? For example, if a certificate issued by Microsoft, would you believe this certificate? If a certificate comes from a website you have never heard of before, would you be so ready to believe it? The digital certificate uses a reliable model so that the end user knows where the certificate comes from and whether it is authentic or not. The next point of interest is to whom the certificate was issued. A digital certificate can be issued to a user, computer, device, or web page. Using this information, you can verify the digital certificate to verify
Also reliability is essential and any potential cloud provider would need to ensure they had distributed systems to ensure if a server failure occurred our company would not come to a standstill. Some vendors do allow options to export data and back this up, however if we were to store the data on our own servers also, this would minimise the actual cost savings and almost nullify the need for cloud computing.
There are several advantages of using Cloud Computing, for example: “To begin, businesses can have lower cost computers for users.” Alijabre explains that cloud computing can be very beneficial for the businesses. Moreover, businesses will bring great amount of profit into their company, and it will be easy to use it. Alijabres goes on to provide several examples why cloud computing is better. One of of the most important reason why companies are moving towards cloud computing is the lower cost of the system. “To begin, businesses can have lower cost computers for users.” He explains that small business will not need computers that are high performance based. Business can get less expensive computers and store all of their data online instantly, without having them to worry about the space in a
Some other benefits to cloud users include scalability, reliability, and efficiency. While there are benefits, there are privacy and security concerns too. Data is traveling through the Internet and is stored in remote locations. In addition, cloud providers often serve multiple customers simultaneously. All of this may raise the scale of exposure to possible breaches.
Discussion point 2: SCADA networks consists of many computers and software’s which performs many tasks and services in the organization or infrastructure which are considered to be backbone of the country which requires major protection from many cyber threats. In industrialized countries, precise census of SCADA systems is absent which is a big concern. Recently Incident Illinois on alleged water facility incident and Stuxnet virus proves that
1. Abstract The purpose of this paper is to define what SCADA systems are and their application in modern industry and infrastructure, to elucidate the reasons for rising concern over the security of these systems, to analyze the fundamental vulnerabilities and to put forth recommendations for the implementation of security in these systems.
The seismic imaging technology mainly is an important tool to search for new sources of energy. It functions by sending sound waves underneath which directed to the rocks (earth layers) in some areas that they think it contains neutral gas or oil. These sound waves bounced to some pore spaces in rocks to being reflected again on the surface to be received by what they call Geophones. With that signals represented in a thousand of squiggle lines as mentioned in Chevron’s site, they have an amount of data. Then these data assigned to a team to analyze that data to get results. This technology helped Chevron by leading to oil and gas explorations by the facility the whole process. As an example, Chevron introduced this technology to their project
Cloud computing is provided by an outside organization; it takes the place of an existing system, usually an internal network, and moves it to a web based service where all information in the company will be processed and stored. Internal IT infrastructures can be costly due to maintenance and personnel. Cloud computing reduces costs by removing the need for an internal system and the people to run it.
Individual use on request -The resources can be used at anywhere, anyplace and at any time via a global network. There is no need for human intervention from a service provider in order to access the resources
Businesses, be it small-scale or large-scale, use cloud computing for the storage of data since it is cheaper than buying hardware and software separately.
The basic structure wires media transmission, transportation, noteworthiness, managing a record, back, water supply, crisis associations, subject driven affiliations, agribusiness, and other noteworthy systems and associations that are crucial to the security, budgetary accomplishment, and social prospering of general society. The crucial foundation is portrayed by interdependencies (physical, modernized, geographic, and genuine) and multifaceted nature (collections of accomplice areas). Propelled interdependencies are a deferred result of the unavoidable computerization and robotization of foundations. The principal foundation disrupting impacts can especially and roundaboutly affect particular structures, impact critical geographic areas, and send swells all through the national and general economy. For instance, under standard working conditions, the electric power foundation requires animates (vaporous oil and oil), transportation, water, managing a record and back, media transmission, and SCADA structures for checking and control. There is a making worry over the security and success of the SCADA control frameworks to the degree vulnerabilities, nonattendance of assurance, and care. Thusly, data security association benchmarks and strategies should be associated with SCADA frameworks notwithstanding.
Cloud along with this it reduces the cost of deployment. It also allows unlimited storage size. Cloud with its increased computing power and advanced techniques provide services in a rapid scalability as and when needed i.e. elastically. It also allows workgroup collaboration in real time.
Unfortunately, with the rise of interests and increasing in exports it was only a matter of time before the industry of aerospace, defense, and security was going to experience cybersecurity threats. In this industry, vulnerabilities such as compromised Personally Identifiable Information (PII), Distributed Denial of Service (DDoS) attacks on the critical infrastructure to attacks such as economic espionage exist. “Agencies and companies are facing significant and ongoing cybersecurity and safety threats, while at the same time confronting nontechnical issues including budget uncertainty, an evolving national strategy, and how, when, where, and if information can be shared among impacted agencies and industries” (Aerospace & Defense