SCADA Systems Write Up

Ahmed Kargbo
CYSE 200T
Supervisory Control and Data Acquisition Systems- Write Up

What are SCADA Systems?
Supervisory Control and Data Acquisition Systems are industrial control systems typically used to power and run infrastructure. These systems pick up a lot of data from sensors and devices for operators to be able to observe and control the systems smoothly. An example of a Supervisory Control system is the control system that is used in a water treatment facility. The remote terminal units provides digital data which is used to monitor the water levels, adjust the chemical dosing, and control pumps to
ensure the water is safe and clean.

How SCADA Systems Work…
Supervisory Control and Data Acquisition Systems use sensors to communicate data. The remote terminal units are connected to the main sensors, and it then converts the signals into digital data and sends the info to the supervisory team according to SCADA Systems. The process follows a basic input to output protocol.

Vulnerabilities…
Vulnerabilities associated with critical infrastructure systems are typically; software being used may be outdated, weak / common passwords, lack of encryption, and inadequate security measures. Examples of inadequate security measures may include, lack of firewalls, lack of two factor authentication for users and employees, easy access to systems and data. It is important to keep security up to date frequently and be “hip” with society to minimize risk.

SCADA Role in Risk Mitigation
Supervisory Control and Data Acquisition applications provide a variety of security measures to mitigate risks. SCADA apps use a unique and secure communication method of data. These apps also have a strong authentication method, which translates to a powerful encryption system to protect data transferring.

Conclusion
In conclusion, Supervisory Control and Data Acquisition Systems are industrial control systems typically used to power and run infrastructure. Supervisory Control and Data Acquisition Systems use sensors to communicate data using a basic input to output protocol. There are several vulnerabilities associated with critical infrastructure but SCADA applications combat them by providing a unique and secure communication method, a strong authentication method and a powerful encryption system to protect data transferring.

Leave a Reply

Your email address will not be published. Required fields are marked *