Defend ICS/SCADA System-Operation Ocean View-Mission 8
Scenario Overview:
There are reports that the local water authority has just been compromised, putting delivery of clean water for the city at risk. Readings from the water treatment plant's SCADA systems are showing that the chlorine level is 10 times the amount deemed safe for consumption. It's possible that someone gained access to the plant's SCADA system from the inside and were able to override all safety functions.
How to be Successful:
The learner will use network and service analysis to find a Programmable Logic Controller (PLC) that is actively being attacked by an adversary. Through service monitoring, network analysis, and firewall management, they will identify and report the adversary to the intelligence community, implement firewall rules to stop the adversary access to the PLC, and monitor the service post firewall configuration to ensure the services remain running.
What should you know prior:
Learners should be familiar with network infrastructure, management & defense, vulnerability assessment and incident response processes.
Load Time |
14 min |
Time Limit | 40 hrs |
# of Tasks | 4 |
Hints | Yes |
Save Session | Yes |
Team Based | Yes |
Scenario Overview:
There are reports that the local water authority has just been compromised, putting delivery of clean water for the city at risk. Readings from the water treatment plant's SCADA systems are showing that the chlorine level is 10 times the amount deemed safe for consumption. It's possible that someone gained access to the plant's SCADA system from the inside and were able to override all safety functions.
How to be Successful:
The learner will use network and service analysis to find a Programmable Logic Controller (PLC) that is actively being attacked by an adversary. Through service monitoring, network analysis, and firewall management, they will identify and report the adversary to the intelligence community, implement firewall rules to stop the adversary access to the PLC, and monitor the service post firewall configuration to ensure the services remain running.
What should you know prior:
Learners should be familiar with network infrastructure, management & defense, vulnerability assessment and incident response processes.
Load Time |
14 min |
Time Limit | 40 hrs |
# of Tasks | 4 |
Hints | Yes |
Save Session | Yes |
Team Based | Yes |