Cybersecurity, Technology, and Society
The short arm prediction of knowledge in the world of cybersecurity:
Before the development and introduction of technology, the human race’s moral compass was very “black and white”. There was no morally gray area because humans, before technology, had clear understandings of their consequences and outcomes of their actions. However with the advancement of technology, the meaning of morality adapted and now morality is not so easily defined. Human actions have always been good and evil, but before with no technology the outcomes were easier to predict. Hans Jonas talked about all of this as well as the meaning of the gray area of morality now in the present day with the development and advancement of tech. With that said, knowing that as technology progresses, so will crime. We must create procedures to combat the evil actions of humans through development of policies and infrastructure to adapt to the ever-changing futuristic world we live in today.
Workplace deviance opportunities:
Workplace deviance can be defined as the desire to cause harm to an organization or workplace. With the advancement of the internet and technology, opportunities for workplace deviance is on the increase through the recent upward trend of cyber jobs becoming available. When people who are qualified to do cyber jobs, but have malicious intentions with the permissions and access to sensitive materials they are provided, opportunities for workplace deviance can occur. This is true now more than ever because the internet and technology in general are growing at an exponential rate every day, and the more they grow, the more cyber jobs we as a society will require. The more jobs we require, the more opportunities for deviance can occur. Additionally, cybercrimes are arguably easier to commit since they are done behind a screen, and not physically (for example, in front of a surveillance camera).
SCADA Systems
SCADA (Supervisory Control and Data Acquisition) Systems are a centralized control system architecture that is made up of computers, networked data communications, and GUI (graphical user interfaces) to interface with machinery or process plant management. They are used mainly in industrial control systems. They control different infrastructure processes, such as water and wastewater treatment, pipelines, wind farms, as well as facility based processes like airports, space stations and ships. In most cases, a SCADA system does not control these processes in real time, but instead refers to the system that coordinates the processes in real time.
SCADA components include supervisory computers, remote terminal units, PLC (programmable logic controllers), communication infrastructure, and human-machine infrastructure. Supervisory computers, (sometimes referred to as supervisory stations) refers to the software and servers that are responsible for communication with field equipment. To increase system integrity, multiple servers are configured in dual redundant foundation, which provides monitoring/control during the event of a server failure.
Remote Terminal Units (RTU), is responsible for converting electrical signals coming from equipment to digital values. This allows for the ability to control certain functionality of system components, such as the opening or closing of a valve/switch, or the speed setting of a pump.
Programmable Logic Controllers (PLC), are components that are connected to sensors and actuators. They are networked to communicate with the supervisory computers. Depending on the size of the SCADA system, PLC’s may either be connected directly via wireless link or through RTU’s for communication.
Communication Infrastructure is the component that actually connects the RTU’s and PLC’s to the supervisory computer, and as the name suggests, allows for communication between the components. RTU’s and PLC’s operate autonomously and operate off the last given command from the supervisory computer.
Human Machine Interfaces (HMI) refers to the operator window of the supervisory system. It displays graphical data of the plant being controlled, as well as event logging data. to the necessary personnel. It is linked to the supervisory computers and provides these representations in real time in the forms of diagrams, alarm displays and graph trends.
The security of SCADA systems is often questioned, as they are potential targets of cyber attacks. Some believe that, because SCADA systems are not connected to the internet, they are safe from such cyber attacks. It is the belief that since SCADA systems use VPN’s, they are protected enough. However, physical access to network switches and jacks related to SCADA allows for the bypass of security on control software and SCADA networks.
In conclusion, SCADA systems are incredibly necessary to every day life. They control many industrial processes, such as the distribution of water, the controlling of traffic lights, gas transportation, oil pipelines, etc. SCADA components consist of different electrical and data processes, and all communicate with each other, to be controlled by the supervisory computer. Additionally, the security of these systems is extremely important, because in the event of a cyberwarfare/attack, the consequences it would have would be dire.