{"id":290,"date":"2022-04-21T23:27:53","date_gmt":"2022-04-21T23:27:53","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/adamjohnson\/?p=290"},"modified":"2022-04-21T23:27:54","modified_gmt":"2022-04-21T23:27:54","slug":"scada-systems","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/adamjohnson\/2022\/04\/21\/scada-systems\/","title":{"rendered":"SCADA Systems"},"content":{"rendered":"\n<p>The supervisory control and data acquisition systems or \u201cSCADA\u201d are used to monitor and control many infrastructures and industrial processes.\u00a0 SCADA systems use several hardware and software elements to collect and relay information to a human interface where the information can be evaluated.\u00a0 Human interfacing is usually very basic and includes monitoring and overriding or confirming warnings. Human interaction is done through a Human machine interface or HMI.\u00a0 HMIs take the data relayed from the PLCs and RTUs and convert into a graphical display used for monitoring or simple command inputs.\u00a0 Remote terminal Units or \u201cRTUs\u201d are used by SCADA to collect sensor information and convert it to readable data by a computer or any human controllable monitoring device.\u00a0 This could be a temperature reading or fluid level gauge readout, which would then be converted to data readable by software and converted to a readable output for human evaluation.\u00a0 Programmable logic controllers or \u201cPLCs\u201d are used to interface with hardware and control operations or relay warnings and alarms to the RTUs for translation.\u00a0 Most of the PLC\u2019s functions are automated and are programmed to provide a standard operating environment for the equipment only reporting when something is out of standard settings.<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; SCADA systems are used in very important infrastructure processes and exploitation or a single system being compromised could have very bad consequences.&nbsp; SCADA systems communications can include text messages, emails, alarm signals and others.&nbsp; The interfacing of the systems between hardware and monitoring is currently through WAN\/IP protocols.&nbsp; The use of this type of interface and the connection of protocols being accessible over the internet increases the possibility of attacks.&nbsp; Most SCADA systems are connected and controlled through VPNs.&nbsp; While the VPNs are specifically made for these systems and utilize firewalls, another common threat found through information security is human error or security failures.&nbsp; A disgruntled employee could be used to exploit a system by accessing an unauthorized system and installing malware or other means of exploitation through the Human machine interface.&nbsp; The SCADA networks are based on TCP\/IP so the possibility of packets being intercepted or unauthorized access to the VPN could allow someone to exploit and even control the infrastructure through the use of packets.&nbsp; SCADA systems are specifically designed to remove a lot of human interaction which removes some security issues.&nbsp; Even when human interaction is prompted the privileges and input measures are very minimal, though this type of operation means the functioning of the hardware and systems relies on the programming of the PLCs and interactions of the RTUs.&nbsp; Having backup hardware on site or already in place helps mitigate false readings and downtime associated with eventual hardware failure.&nbsp; SCADA systems are also utilizing mobile devices and web-based clients for control and information relay.&nbsp; Because of the wide variety of uses, hardware and software being used in the operation of a SCADA systems are some of the most important systems to secure which makes them a valuable target with many avenues of approach.&nbsp; SCADA systems are always assessing threats and developing counter measures to help secure the most important infrastructures in our lives.&nbsp; SCADA breaches have resulted in destroyed water pumps, pipelines being shut down and subject to ransom.&nbsp; Other breaches have involved power grids, water supplies, dams, transportation systems and the ransom of city archives.&nbsp; Many malwares and viruses have attacked and compromised SCADA systems in the past, such as \u201cStuxnet&#8221; and &#8221;flame\u201d.&nbsp; Due to the value and operation, SCADA systems are some of the most important and valuable targets for attackers, which also makes SCADA a high priority for security professionals to continually develop and secure its systems.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">&nbsp;<\/h1>\n\n\n\n<h1 class=\"wp-block-heading\">References<\/h1>\n\n\n\n<p>SCADA Systems (2022). SCADA Systems.<\/p>\n\n\n\n<p><a href=\"http:\/\/www.scadasystems.net\/\">http:\/\/www.scadasystems.net\/<\/a><\/p>\n\n\n\n<p>Info Security Group (2013). 25 New SCADA flaws Emerge in Critical Infrastructure<\/p>\n\n\n\n<figure class=\"wp-block-embed\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/www.infosecurity-magazine.com\/news\/25-new-scada-flaws-emerge-in-critical\/\n<\/div><\/figure>\n\n\n\n<p>Kovacs, Eduard (2021).&nbsp; Ransomware Hit SCADA Systems at 3 Water Facilities in U.S.<\/p>\n\n\n\n<figure class=\"wp-block-embed\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/www.securityweek.com\/ransomware-hit-scada-systems-3-water-facilities-us\n<\/div><\/figure>\n\n\n\n<p>Ewing, John (2021) What SCADA breaches have taught us about Enhancing Security<\/p>\n\n\n\n<figure class=\"wp-block-embed\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/www.cdw.com\/content\/cdw\/en\/articles\/security\/learning-from-scada-breaches.html\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>The supervisory control and data acquisition systems or \u201cSCADA\u201d are used to monitor and control many infrastructures and industrial processes.\u00a0 SCADA systems use several hardware and software elements to collect and relay information to a human interface where the information can be evaluated.\u00a0 Human interfacing is usually very basic and includes monitoring and overriding or &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/adamjohnson\/2022\/04\/21\/scada-systems\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">SCADA Systems<\/span><\/a><\/p>\n","protected":false},"author":23385,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/adamjohnson\/wp-json\/wp\/v2\/posts\/290"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/adamjohnson\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/adamjohnson\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/adamjohnson\/wp-json\/wp\/v2\/users\/23385"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/adamjohnson\/wp-json\/wp\/v2\/comments?post=290"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/adamjohnson\/wp-json\/wp\/v2\/posts\/290\/revisions"}],"predecessor-version":[{"id":291,"href":"https:\/\/sites.wp.odu.edu\/adamjohnson\/wp-json\/wp\/v2\/posts\/290\/revisions\/291"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/adamjohnson\/wp-json\/wp\/v2\/media?parent=290"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/adamjohnson\/wp-json\/wp\/v2\/categories?post=290"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/adamjohnson\/wp-json\/wp\/v2\/tags?post=290"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}