Supervisory control and data acquisition or “SCADA” is the usage of systems to monitor and control processes regarding infrastructure. A SCADA system allows for around the clock maintenance and control, proving to be cost effective and less vulnerable to human error as it uses automated systems through hardwares such as RTUs and PLCs. These systems gather information and data in real-time and alert an operator of any abnormalities within a process.
A Deep Dive Into the Components of a SCADA System
The Human Machine Interface (HMI) is what allows softwares to be accessed by humans, typically using graphics and charts. These designated persons control processes using HMI. A remote terminal unit or “RTU” is what is connected to the physical equipment, typically being a part of a larger system (SCADA Systems, 2023). RTUs are microprocessors that send data to supervisory streams by converting sensor signals to digital data. To put it simply, a programmable logic controller is a computer which can send and receive data through specialized instructions. PLCs are integral as a SCADA system cannot operate without it. Supervisory stations are the servers and software where field equipment communication is executed. All data regarding processes will be gathered here, typically using multiple servers to increase the integrity of the system.
The Three Generations of SCADA
The architecture of SCADA systems can be divided into first, second, and third generations or monolithic, distributed, and networked, respectively. At the beginning of SCADA’s development, networks were a non-existing concept meaning that they were systems that ran independently. As these systems evolved, information, using LAN, and processing began to be shared and distributed through multiple stations, which was considerably less costly than the previous generation. Although, at the time, it was more convenient, the security of these systems were unknown due to its proprietary protocols. Lastly, the third generation are what SCADA systems that are being used today. Since internet access is critical to the function of these operating systems (Devasia, 2020), consequently, the vulnerabilities have increased with this meaning that security measures must also adapt to these changes.
SCADA…Is It Even Secure?
Although SCADA is becoming more prominent as time goes on, there are still some security risks and issues that can be cause for concern. For context, a large sum of SCADA systems oversee physical processes. These physical processes can include water distribution, traffic light systems, gas and oil pipelines, and even nuclear power plants along with other processes that we as consumers use daily (SCADA Systems, 2023). Any damage to these systems can create a domino effect of negative consequences, wreaking havoc to anyone who may utilize the processes that they oversee. According to “Securing SCADA Systems from Cyber Attacks”, employees of these SCADA systems are the most vulnerable asset (Devasia, 2020). A way to mitigate this risk, however, to ensure employees have proper training. This means making sure they are trained on how to spot potential security threats as well as to handle and report them. SCADA systems control and monitor critical infrastructures and any damage to these systems will cause a devastating physical loss and damage.
Conclusion
To conclude, SCADA systems are what control and monitor processes regarding infrastructure. These processes can range from water flow and treatment all the way to electricity production at nuclear power plants. These systems gather data in real-time in order to control the equipment used by these processes. Through alarms, SCADA notifies of hazardous conditions within these processes to its Operators. With every operation of course comes risks and vulnerabilities however, SCADA works to mitigate these risks through the usage of RTUs and PLCs which allow these systems to function. SCADA systems allow for around the clock maintenance and surveillance of industrial processes, minimizing the risk of human error by using automated systems.
References
Devasia, A. (2020, May 31). SCADA system usage in the daily life of an engineer – technical articles. Control. https://control.com/technical-articles/scada-usage-in-the-life-of-an-engineer/
Devasia, A. (2020b, July 1). Securing SCADA systems from Cyber Attacks – technical articles. Control.https://control.com/technical-articles/securing-scada-systems-from-cyber-attacks/#:~:text=Every%20SCADA%20system%20has%20hardware,of%20the%20whole%20SCADA%20system.