Defend ICS/SCADA System-Operation Ocean View-Mission 8
Rated 3.5/5 based on 11 customer reviews

Defend ICS/SCADA System-Operation Ocean View-Mission 8

Available: In Stock
$0.00

Image

Scenario Overview: 

There are reports that the local water authority has just been compromised, putting delivery of clean water for the city at risk. Readings from the water treatment plant's SCADA systems are showing that the chlorine level is 10 times the amount deemed safe for consumption. It's possible that someone gained access to the plant's SCADA system from the inside and were able to override all safety functions.

How to be Successful:

The learner will use network and service analysis to find a Programmable Logic Controller (PLC) that is actively being attacked by an adversary. Through service monitoring, network analysis, and firewall management, they will identify and report the adversary to the intelligence community, implement firewall rules to stop the adversary access to the PLC, and monitor the service post firewall configuration to ensure the services remain running.

What should you know prior:

Learners should be familiar with network infrastructure, management & defense, vulnerability assessment and incident response processes.

DEFENSIVE
Click For Video
Load Time

14 min

Time Limit 40 hrs
# of Tasks 4
Hints Yes
Save Session Yes
Team Based Yes

Scenario Overview: 

There are reports that the local water authority has just been compromised, putting delivery of clean water for the city at risk. Readings from the water treatment plant's SCADA systems are showing that the chlorine level is 10 times the amount deemed safe for consumption. It's possible that someone gained access to the plant's SCADA system from the inside and were able to override all safety functions.

How to be Successful:

The learner will use network and service analysis to find a Programmable Logic Controller (PLC) that is actively being attacked by an adversary. Through service monitoring, network analysis, and firewall management, they will identify and report the adversary to the intelligence community, implement firewall rules to stop the adversary access to the PLC, and monitor the service post firewall configuration to ensure the services remain running.

What should you know prior:

Learners should be familiar with network infrastructure, management & defense, vulnerability assessment and incident response processes.

DEFENSIVE
Click For Video
Load Time

14 min

Time Limit 40 hrs
# of Tasks 4
Hints Yes
Save Session Yes
Team Based Yes