SCADA stands for Supervisory Control And Data Acquisition. The SCADA System is the primary system component that controls everything, serving as host and connected to the HMI, which “provides the diagnostic data, management information, and trending information.” Because of HMI’s position in SCADA systems and capabilities, it’s considered an ideal threat to control and misuse. Remote control access via the internet and mobile apps as they “are used through… tablets that help engineers control PLCs and RTUs, allowing engineers to connect… through the internet. A vulnerability can mean openings for attacks, giving potential threat actors a chance to directly influence industrial processes or give them an opening” (reference 1). Communication protocols are lacking in the security department, leaving a breach in SCADA systems. Vulnerabilities associated with infrastructure systems and the role SCADA applications play in mitigating these risks are related to internet connection reliability, security, and latency. The primary security issue is the unauthorized access to software, infections, and problems affecting the host. The role SCADA applications play in mitigating these risks includes being vigilant and consistently up-to-date on rooms for error where one knows that corruption can slip by incorporating authentication and authorization steps alongside 24/7 surveillance.
References
1. One flaw too many: Vulnerabilities in SCADA systems. Security News. [accessed 2023 Nov2]. https://www.trendmicro.com/vinfo/us/security/news/vulnerabilities-and-exploits/one-flaw-too-many-vulnerabilities-in-scada-systems
2. SCADA systems. SCADA Systems. [accessed 2023 Nov 4]. https://www.scadasystems.net/