SCADA Systems

Supervisory Control and Data Acquisition or SCADA touches on Industrial Control Systems. ICSs are often used to control infrastructure, facility-based, or industrial process. Just like every other system in the world, SCADA has had their system threatened numerous times. Cyber attacks are extremely likely to occur within SCADA services. These systems are always secured physically with officers, which is great, however, that could turn into a weak link or vulnerability. When dealing with security I believe that you should think outside of the box when discussing possible threats and ways criminals can get unauthorized access to software and information. Physical security guards could easily be manipulated or talked into trading on their company for a higher dollar. It may seem unlikely and extreme, but it is possible, and it is definitely worth the thought. Information is too valuable to be taken lightly. Negative effects of host machines could come from viruses and bugs such as stack and buffer overflows. Another serious threat on SCADA systems originates from packet access to network segments that host SCADA devices. Unfortunately, there is not much security over the packet control, which give users the opportunity to control packets that were sent to SCADA. In combat to these threats and vulnerabilities criminals propose, many people that use SCADA believes that a VPN is a great source of protection. A VPN or a virtual private network provides secure access to a remote computer, laptop, or any device over the internet. With a VPN, sensitive data can safely be transmitted over the internet. As of now, close associates with SCADA are working on developing a specialized industrial virtual private network and firewalls. The implementation of white listing solutions have made its appearance to minimizing and controlling threats

Leave a Reply

Your email address will not be published. Required fields are marked *