Vulnerabilities
BLUF: Vulnerabilities of SCADA systems include risk of unauthorized access to softwares, lack of security controls, and out of date software.
One benefit of SCADA systems is that they are easily accessible and controllable is also one of its biggest faults. It allows for anyone to be able to get into the networks and make negative changes. SCADAs are responsible for extremely important systems like traffic lights, oil pipelines, and water distribution so the consequences of them being hacked are severe (SCADA Systems n.d.). One vulnerability is the risk of unauthorized access to software. Since many systems are operated wirelessly on the internet, there’s a risk for malware or worms. One Ohio nuclear power plant lost access to their safety monitoring system for 5 hours due to a computer worm (Secpoint n.d.). Another vulnerability is a lack of security on packet controls. Anyone who can send packets to SCADA devices has the ability to control it. Normal VPNs often are not enough to stop attacks (SCADA Systems n.d.). Lastly, most systems were created many years ago and since then have not been updated to keep up with new cybersecurity measures (Groupsense n.d.).
Mitigation
BLUF: Mitigation techniques include whitelisting, firewalls, authorization/authentication protocols, and keeping up-to-date softwares.
As for the packet control issues, one mitigation technique involves creating specialized VPNs and firewalls for SCADA networks (SCADA Systems n.d.). Keeping all softwares up to date, regular password changes, and adding two factor authentication are all ways to lessen cyber threats (Alcala 2023). Relating back to authorization, companies should implement whitelisting, where only a select few are granted access into certain systems and the rest are automatically denied (SCADA Systems n.d.). Backup and recovery servers should be added in the case of an attack so that productivity is not completely shut down (Alcala 2023). Looking at the NIST Cybersecurity Framework as well as the CIA triad may prove to be a useful guideline.
Conclusion
SCADA helps regulate some of the world’s most critical infrastructures. Therefore, protecting them from cyber and physical threats should be held at utmost importance. There are many vulnerabilities involving unauthorized access and out of date software; however, there are also multiple steps that can be taken to address these threats.
References
Alcala, F. (2023, September 27). Protecting SCADA systems from cyber-attacks. Compass IT Compliance. https://www.compassitc.com/blog/protecting-scada-systems-from-cyber-attacks
SCADA systems and their vulnerabilities. Scada systems and their vulnerabilities. (n.d.). https://www.secpoint.com/scada-systems-their-vulnerabilities.html#:~:text=Common%20SCADA%20System%20Vulnerabilities,a%20cyber%20attack%20does%20happen.
SCADA systems. SCADA Systems. (n.d.). https://www.scadasystems.net/
Team, E. (n.d.). Mitigating ICS and SCADA vulnerabilities. Home. https://www.groupsense.io/resources/mitigating-ics-and-scada-vulnerabilities#:~:text=To%20protect%20against%20ICS%20and,or%20isolate%20it%20if%20attacked.