SCADA Systems

The True Meaning of Supervisory Control and 
Data Acquisition

Introduction to Supervisory Control and Data Acquisition

When it comes to Supervisory Control and Data Acquisition which is better known as SCADA, is a system that contains software and hardware. Which they then use this system in the industrial process, that allows the sensors from the system to monitor the equipment. As an example, it is used to monitor the pumps, motors, and valves. Which than can convert to the many things that we use in our day-to-day life. Such as traffic lights, the flow of electricity, and even the transports of our gas and oil. With the SCADA having control in a lot of different systems, it raises awareness as to what type of vulnerabilities are in the system. And how is this system able to mitigate risk that it comes in contact with.

Vulnerabilities with Critical infrastructure system 

When it comes to SCADA, the hardware and software that is used is so important because it controls a lot when it comes to the industrial process. When it comes to critical in fractures within cyber security the treats are getting higher. “These systems are subject to increasing risks based on technology vulnerabilities, cyber-threats, and system consequences. “(Henrie 2015, p38-45) Which is causing engineers that are using this system to ensure that they are providing safe, efficient, and effect operations. 

How does SCADA Mitigating risk 

Some may wonder due to the SCADA having control in so much of the system what form of mitigation is being used the lower the chances of risk. And the answer is easy with the use of notification, where if this system is noticing a form of different types of errors it will alert a human. Then after the notification alert it is up to the human to provide the proper change to allow the system to work back again at full efficacy.

Conclusion

When it comes to the SCADA it is a system in the industrial process, that allows the sensors from the system to monitor the equipment. It is used to ensure that the software in the industries is running on full operations. While providing the notification to ensure the proper safety and concerns that are reached for it to run on full efficiency. This system is bringing a new form of revolution when it comes to software and hardware. 

Reference

Henrie, Morgan. “Cyber Security Risk Management in the SCADA Critical Infrastructure Environment.” Taylor & Francis, 20 Apr. 2015, https://www.tandfonline.com/doi/abs/10.1080/10429247.2013.11431973. 

Kurii, Yevhenii. “Scada Cyber Security Threats and Countermeasures: Ultimate Checklist.” ELEKS, 2 Mar. 2022, https://eleks.com/blog/scada-cyber-security-threats-countermeasures/. 

Loshin, Peter. “What Is SCADA (Supervisory Control and Data Acquisition)?” WhatIs.com, TechTarget, 16 Dec. 2021, https://www.techtarget.com/whatis/definition/SCADA-supervisory-control-and-data-acquisition. 

Leave a Reply

Your email address will not be published. Required fields are marked *