Adrian Jordan
Sunday, Nov 12, 2023
SCADA Systems
The Scada is a system worth learning about. Learning about it can help us understand how to improve it in every way possible.
Human Machine Interface/ Scada package
HMI apparatus that gives data in real to the human operator which enables them to use the HMI as a control process. The information the HMI gives is graphical, it’s in the form of mimic diagrams. Hospitals use this, for example when you go to a hospital and see the EKG reading your heart rate is an example of HMI. Scada system may have the components of the Distributed Control System. This means an easy logic process without having the master computer involved. IEC 61131-3 is a block programming language that requires less training. HMI/SCADA packages are out on the market allowing electrical engineers, mechanical engineers, or technicians to build it how they would want to. These would be located in a Supervisory Station
Generations
First, when the Scada was first developed, networks did not exist at the time so it had no connection to other systems until RTU vendors came along and designed a wide network area to communicate with RTU. Second. Information between multiple stations was able to be shared in real time due to LAN processing being distributed between many multiple stations. With protocols being used for the network, along came trouble with security issues because few people knew how the Scada installations were. Third. The Scada belongs to the third generation it so is easy to have communication between the system and the master station through WAN protocols like the (IP). even though it is more vulnerable to threats since it’s on the internet, Security measures can be taken place to stop those threats dealing with the SCADA systems.
Security
SCADA-based systems can be questionable about their security but Scada is secure enough because it is secured physically. It is not connected to the internet so through for it is safe. For a crime to happen it must be a person that has unauthorized access that got in.
Conclusion
Scada systems have come a long way and have improved so much over time. Knowing how the Scada systems came up in today’s world is good to know. Knowing how important it is can help us make it better and give us opportunities to do more with it in the future.
The “Short Arm” of Predictive Knowledge
The “Short Arm” of predictive knowledge, is going day by day and being prepared to stay up to date with cyber policies so we can best stay protected. With how fast the tech world is moving, it is hard to grasp the thought of what will happen in the future, we can only make small predictions. Being able to go day by day will help ensure that all cyber policies are being checked over and covered. Being flexible and adaptive to new and up-to-date cyber policies will help keep you protected from cybercrime.
The Human Factor in Cybersecurity
Cybersecurity training is essential. Without proper training, you can be vulnerable to a lot of cyber threats, and without the training, workers won’t have full knowledge of what to do when an attack happens. Cybersecurity training has to be taken seriously so threats can be prevented or dealt with quickly.
Training
While being Chief Information Security Officer, balancing the trade-off would be hard with cybersecurity technology always improving every day. The main focus of training would be to understand important threats that happened before and the attacks that were able to put the company to a stop. Having an understanding of how those attacks happen would help us prepare for future attacks, and have the company up and running faster. Since this won’t be so costly we could focus on backups. Secondly training on how to keep up to date backups and training install off line back-ups would help a lot. That would allow us to have the latest data for the company and would have the company up and running faster. I would train on firewall hardware. Doing firewalls properly would help protect the company from attacks. Knowing there’s a budget I would focus more on prevention than detection. Trying to train and have all the detection can cost a lot. It would best to “prevent an attack then detect an attack and have to deal with the high cost after the attack.”
Conclusion
With cybersecurity having so many ways to train on cyber technology, it can cost a lot of money. Taking the train on the important things in cybersecurity is very important because technology is always growing. Trying to train and keep up with cyber technology would oversee any limited budget.
Reference