SCADA Also known as supervisory control and data acquisition, it refers to the ICS better
known as the industrial Control systems. It is used to control infrastructure processes like,
water treatments, traffic lights, gas pipelines, and wind farms.
SCADA Systems Concepts:
It refers to the centralized systems that control and the monitor entire sites, or the
complex systems spread over large areas. They implement distributed databases also known as
tag databases containing data elements called points or tags. Which is a single input/ output
value controlled or monitored by the system.
SCADA Architectures:
SCADA has three different generations; the First Is the Monolithic which were
mainframe systems used for computing, SCADA also did not exist at this time. The Second was
Distributed where information between multiple stations shared in real time through LAN and
the processing was distributed between various multiple stations. The third Is Network SCADA
belongs to this generation. It is the communication between the system and the master station
is done through the Wan protocols like the (IP)Internet Protocols.
Security Issues:
Security of SCADA based systems are potential targets to cyberterrorism/ cyberwarfare attacks.
There are beliefs that SCADA networks are safe enough because they’re secured physically. It is also
wrongly believed that the SCADA networks are safe because they are disconnected from the internet.
There are two major threats. The first is unauthorized access to software, like virus infections or other
problems that can affect the control host machine. The second is packet access to network segments
that host SCADA devices. Less or no security on actual packet control so those sending packets to SCADA
device are in the position to control it.
SCADA Vulnerabilities:
Thing that can pose a threat to SCADA are malware, viruses, spyware and ransomware,
Hackers, Employees could also be a threat.
SCADA systems. SCADA Systems. (n.d.). Retrieved March 21, 2023, from
http://www.scadasystems.net/