Jason Exume
Getting To Know the SCADA System
Bluf
There are a number of vulnerabilities associated with critical infrastructure systems. Some systems harbor assets, networks, and critical data both physical and digital that could be vital to the U.S. Some systems are so sensitive that they could even bring a devastating shock to National security. Although this would be unfortunate if such info were to get into the wrong hands, thankfully we have systems in place such as SCADA to mitigate these risks. Although not perfect, it aids in combatting several vulnerabilities.
What is the SCADA system
SCADA stands for Supervisory Control and Data Acquisition. It has ties to ICS which stands for industrial control systems and is used to control infrastructure processes in just about all business types. It ranges from ones that strive in the air to the ones that remain on the ground. SCADA can be thought of as “a system that uses computers, networked data communications, and graphical Human Machine Interfaces (HMIs) to manage and control industrial processes” (2024 by Vidya Muthukrishnan). Through this system, it converts signals to digital data, carries out a command, and then provides an analysis/graph of what has occurred.
How the SCADA works
SCADA systems focus on networking with databases holding data called points or tags. “A point is an output or input value either manipulated or monitored by the system. The actual output or input of a system is represented by a hard point, whereas the soft point is a result of different math and logic operations applied to other points” (SCADA Systems 2025). These points are usually stored as timestamp-value pairs. The Series of the timestamp-value pairs gives a history of the particular point. (SCADA Systems 2025)
Components of SCADA and their function
In all, there are 4 components to SCADA. They include Supervisory Computers (SC) Remote Terminal Units (RTUs), Programmable Logic Controllers (PLCs), and lastly HumanMachine Interface (HMI). (SC) can be thought of as servers tasked with communicating with field equipment such as (PLCs, and RTUs).it can store info and send out commands. (RTUs) are devices that can convert electronic signals to digital data. An example of this could be receiving an electronic signal to open a heavy door and converting it to digital data. (PLCs) are used to handle simple local tasks such as opening something like a valve or turning off a pump. And lastly, we have (HMI). HMI is something which operators use in tandem with the SCADA system. It showcases info in a neat and easy to read format. It allows humans to further interact and manipulate a system while also breaking down digital data.
vulnerabilities associated with critical infrastructure systems
Critical infrastructure systems include smart energy technologies such as pipelines and renewable energy. It can also include water-based systems such as water pumps and sewage systems and in some cases range to transportation systems. Although there are many more that could be named, these are just a few examples of what systems can be considered critical. While important, they do come with their own unique set of vulnerabilities. Many infrastructure systems were established ages ago, and some today continue to use their original technology. As a result, they have become outdated, leaving them vulnerable to more advanced offensive attacks. Another vulnerability could be as simple as human error. Humans, if not properly educated in the severity of cyber threats, can be prone to clicking on malicious links through email which could then provide an attacker with a doorway to deal a great amount of damage. To avoid instances such as the ones listed, it’s best to keep up to date with new security threats and tactics that emerge as technology continues to advance. A third vulnerability could be a lack of physical security. While cybersecurity is important, physical security could be considered just as important. Attackers having direct physical access to server or control rooms can allow for tampering of important Equpment. Weak passwords can pose a vulnerability to organizations, as well as a lack of firewall options. Almost any device could be an entry point for a cyber-attack. These days even a sub important device could provide an attacker with the necessary conditions to launch a devastating attack towards a system
How SCADA applications mitigate risks
Risk mitigation refers to protocols in place to reduce the likely hood of penetration to a given system. “SCADA plays A key role in improving efficiency, reducing downtime, and enhancing overall operational reliability “(The Claroty Team 2024). To prevent data from being tampered with SCADA uses Encrypted communication protocols. SCADA systems are equipped with Intrusion detection and monitoring devices that scan constantly for abnormal cyber behavior. SCADA systems are known to be resilient during attacks and have backup systems in place to ensure proper protection over organizations.
SCADA system flaws
While the SCADA system is a big help to cyber space, it still has its own set of flaws. One being although its network is not connected to the internet, it can still be unsafe. Another flaw would be attackers gaining unauthorized access to software, virus infections, etc.” physical access to network switches and jacks related to SCADA provides the capacity to bypass the security on control software and control SCADA networks” (SCADA Systems 2025) SCADA vendors are working to correct these flaws by” by developing specialized industrial VPN and firewall solutions for SCADA networks that are based on TCP/IP (SCADA Systems 2025)
Conclusion
In conclusion Critical infrastructure systems must be prioritized due to their importance and potential risk they could pose if compromised. Transportation systems, water treatment and power gid systems all fall into this category. SCADA systems play a huge role in reducing the likely hood of such systems being tampered with by implementing security protocols in place if abnormalities are detected. The benefits of using the SCADA system include real-time monitoring, integrating encryption, and intrusion detection systems. SCADA systems come with backup systems. If one is compromised, another will activate and proceed with necessary protocols. The SCADA system provides its users with relief that there is something out there that can at least aid in reducing the chances of a critical system being compromised. Although not perfect, as time progresses it will evolve just as other cyber technologies will, including ones both malicious and defensive in nature.
Source
SCADA System: What is it? (Supervisory Control and Data Acquisition) | Electrical4U What are the main components of a SCADA system? http://www.scadasystems.net
200T Mod 05 – Engineering, Critical Infrastructure and Cybersecurity – Google Slides
SCADA Risk Management: Protecting Critical Infrastructure | Claroty