What is a SCADA System

The SCADA or the Supervisory control and data acquisition is an industrial control system that controls infrastructure processes (water treatment, farms, wastewater treatment), faculty-based processes (airports, ships, space stations), and of course industrial process (production & manufacturing). These centralized systems control and monitor entire sites by automatic transmissions from either Remote terminal units (RTUs) or programmable logic controllers (PLCs) within a SCADA system. The purpose of the SCADA, for example, in a water treatment plant is to monitor and control all aspects of water coming in and out. The SCADA system automatically determines things needed such as water temperature, adequate water pressure, and treatment needed for the water. While the PLCs job is to control and regulate all aspects of this needed to keep a well-functioning water treatment plant. When the water pressure is low, it’s the PLCs job to increase water pressure and do the exact opposite if it is high. (SCADA systems)

Although mostly controlled through automation, the HMI or Human Machine Interface is a device that forwards data to human operators through graphical data. This allows a person to control regulations within the SCADA. Having this system creates a more monitorial system that helps catch discrepancies within the system preventing malfunctions from happening before they even start. (SCADA systems)

SCADA uses unique hardware, as stated before it is run BY PLCs or RTUs, limiting the need for master computers. In substitute IEC61131-39 (Ladder Logic) is used to create programs that are run under a PLC or RTU. The IEC 61131-3 also allows system engineers to design and program implementations that are being executed via the PLCs or RTUs with very little initial training required. This could all be done on the Programmable automation controller (PAC). (SCADA systems)

Most industries use the 3rd generation SCADA, however, there are newer and newer security issues that come into play. With SCADA being the backbone of industrial control systems all over the world, they are a constant target of cyberterrorism and cyber warfare attacks. SCADA vendors are coming up with solutions, developing industrial VPNs as well as firewalls to prevent unauthorized users from bypassing and hacking networks that control larger SCADA units. Unfortunately, we live in a digital age where newer cyber threats are developed every day. Mitigating these risks before they happen is what could make or break a companies frontline level of security. (SCADA systems)

References
SCADA systems. (n.d.). Retrieved February 22, 2021, from http://www.scadasystems.net/


The Benefits of the NIST Cybersecurity Framework

In this modern-day and age, cyber risks are a virtual but real danger to many larger companies, businesses, government agencies, and non-profit organizations. However, with the help of the Cybersecurity Enhancement Act of 2014 (CEA), the NIST was able to update and develop a newer cybersecurity support system that not only strengthens but secures the infrastructure of organizations, hence the NIST Cybersecurity Framework was developed.

With the cybersecurity framework being the vastly superior and unbiased cybersecurity system, it is readily available for any infrastructure and organization, allowing for both private and public-owned operations. The CYSE framework is designed in various ways to cater to the demands of the different security risks that each organization may potentially undergo. Since the framework is neutral, it remains adaptive to the evolution of technology, making the CYSE framework a more long-term option when implementing security measures.

As the CYSE framework is constantly ever-changing, this reinforces up-to-date global standards, guidelines, and practices concerning technology. Allowing the overall effectiveness of the global economy in terms of products, services, and practices, essentially sufficing the needs and demands in our economy.

Security threats are becoming more and more prevalent from an economic and global standpoint. With the CYSE framework’s accessibility and reliability, this precautionary security measure is what could help prevent large infrastructures from being exposed to growing cybercrime threats around the world.

Opportunities for Workplace Deviance

Deviance could happen anywhere, even within a workplace. However, the question we ask is how does cyber technology create opportunities for deviant acts within a workplace? Deviance is something that is used to intentionally cause harm to an organization or an individual. It could be for a variety of reasons, such as personal gain or even to cause harm.

With most big companies relying on cyber technology to sustain day-to-day operations, employees are the individuals tasked with using cyber technology to perform their jobs. Moreover, this gives employees sensitive information about the company they are working for. Unfortunately, one deviant person with a general knowledge of the companies cyber technology could be catastrophic. For example, an employee for a tech company may have access to sensitive information about the company. Without anyone’s knowledge, that employee could easily be making copies of specific sensitive information to sell to rival companies purely for finical gain. Furthermore, this example exemplifies that cyber technology deviance is something that not only a person who is proficient in hacking could do. Anyone with proper access and the basic knowledge on how to copy files onto an external device such as a USB could do it.