SCADA Write-Up

Evan Miedema

Professor Kirkpatrick

CYSE 201T

November 5, 2022

How SCADA Systems Work

A SCADA system is a hybrid of both hardware and software that uses data from operational technology (OT) to automate industrial processes. SCADA links local or remote servers to the sensors that keep an eye on machinery like motors, pumps, and valves. It is basically like someone is watching your important needs 24/7. These systems help mitigate errors and problems in different systems. If there is an error it is also easier to get notified.  

Vulnerabilities Associated with Critical Infrastructure Systems

SCADA systems are still very vulnerable to attacks. Simple problems include information exposure, stack and buffer overflows, and others. Cyberattacks against SCADA systems frequently take place through the company’s corporate network, where they then impact the operation’s remote control system. Integrators can better understand how and where to deploy mitigations to stop exploitation and stop attacks by identifying potential vulnerabilities in SCADA systems. Unfortunately, SCADA systems manage a lot of hardware, software, and sensors, which increases the attack surface (https://www.trendmicro.com).

Mitigation Risks on SCADA Systems

Organizations must maintain security mechanisms that can fend off cyberattacks in addition to mitigating vulnerabilities. To improve the SCADA system you may identify all system network connections. You can also disconnect the unneeded network connection to ensure knowledge of access regarding your system (https://www.compassitc.com). The best way to improve our SCADA systems is isolating the network. SCADA systems can refine their monitoring systems on a greater scale because it is used to collect information.

Summary

The collection of data in real time from remote places in order to control equipment and conditions is known as SCADA, and it refers to a class of software systems for controlling industrial operations. SCADA systems are very important for modern infrastructure and may be used for the collection of data as well as monitoring threats.

Leave a Reply

Your email address will not be published. Required fields are marked *