SCADA Systems: Vulnerabilities

What are SCADA Systems?
In the following article “SCADA Systems” Supervisory Control and Data Acquisition also known as (SCADA) is a system that is used for monitoring and controlling as implied in the name. More so, this tool is widely used in factories to monitor and control the production lines and the other various machines, as well as in facility-based processes like airports, space stations, ships, and other various places. However, the SCADA system is the middle point that connects other points between information and operation. SCADA is simply just exchanging information to have the ability to control and monitor the various tools or equipment.
SCADA Advantages
The SCADA system is composed of three main systems which are Master Terminal Unit (MTU), Remote Terminal Units (RTU), and Human Machine Interface (HMI). Now, with this system sensors are installed at numerous different locations that are spread across the earth and have various functions that help to manage numerous tasks. This system has many different advantages like Supervisory Control and Data Acquisition (SCADA) is used in wide industries and departments including telecommunications, water, military, energy, transportation, oil & gas, meteorological, etc. This means that the system can hold large amounts of data, meaning it obtains real data simulations but, with the help of an operator. If the system were to ever fail SCADA is advanced enough that in the event of faults or failures. The central advantage is that l this system gives is that it provides an interface to connect to thousands of sensors across countless regions for monitoring and controlling operations. Overall, the Supervisory Control and Data Acquisition are extremely useful because it is the center in communicating and connecting point to manage and control functions so that they complete a task such as producing, securing, or creating for things like water, energy, or transportation, etc.
SCADA Disadvantages
Even though Supervisory Control and Data Acquisition have a lot of advantages it does have a few drawbacks like Programmable Logic Controller based system is a little more complex in the sense of the hardware units and the dependent modules. Being so complex means that the system can only be operated, analyzed, and programmed by skilled professionals to maintain the SCADA system does not become victim to breaches. A big vulnerable is the lack of encryption when it comes to Supervisory Control and Data Acquisition (SCADA) the controller and industrial protocols cannot encrypt communication which leaves it wide open for attackers and other hackers to dig around the software and discover usernames and password. This leads me to a threat that could happen is that the system is manipulated which is referred to as Command Injection and Parameters Manipulation. Which is simply invalid data that has not been verified as a legitimate system. This often allows attackers to execute arbitrary system commands on operational systems. A possible way to prevent this is to have the people operating on the system trained annually so that they learn and new material on the system just in case it improves over time.
SCADA Summary
SCADA systems which are utilized by manufacturing organizations and companies that are in public and private areas to control and support efficiency, distribute data for more intelligent decisions, and communicate system issues to help mitigate downtime. The benefits of SCADA in our industrial collect information leading to better process traceability Storage of performance data to correct quality problems. The primary vulnerabilities are lack of encryption and DDoS attacks which could be solved by add better polices and training annually.
Work Cite
SCADA Systems, 2020, www.scadasystems.net/.
John, Sara. “RF Wireless World.” Advantages of SCADA System | Disadvantages of SCADA System, 2016, www.rfwireless-world.com/Terminology/Advantages-and-Disadvantages-of-SCADA.html.
Check Point. “CRITICAL INFRASTRUCTURE AND SCADA/ICS CYBERSECURITY VULNERABILITIES AND THREATS.” Operational Technology (OT) Systems Lack Basic Security Controls. , 2020, www.checkpoint.com/downloads/products/top-10-cybersecurity-vulnerabilities-threat-for-critical-infrastructure-scada-ics.

Leave a Reply

Your email address will not be published. Required fields are marked *