This paper covers the vulnerabilities associated with critical infrastructures and data.
acquisition and the role SCADA applications play in mitigating these risks/vulnerabilities.
Critical infrastructure systems before SCADA ventured on the expansion of industrial.
production as a whole but without the proper auditing it is safe to say that critical infrastructure.
were very prone to vulnerabilities and risks. Some risks critical infrastructures faced included.
that of data tampering by personnel or even inaccuracies within a plant industry, troubleshooting
and maintenance was also a problem since industries required a huge amount of data to keep.
track of data processes as well as maintain hardware and equipment. This is where SCADA.
was able to revolutionize and patch some of these threats at hand. As centralized systems that
worked to audit field plant architectures with software, SCADA made it possible to keep records.
and even allow graphical displays of processes all possible through the HMI and PLC
microprocessors which report to a database. This made it possible to combat the issue of
potential data inaccuracies and tampering by personnel since historical logs could be.
accounted for as a stamp for processes. Moreover, SCADAs powerful automations make it.
possible for better effective troubleshooting and data response, before this personal
maintenance would find it extremely challenging to reconfigure or troubleshoot equipment since
relays and timers would depend on people who were doing tedious calculations. The biggest
part where SCADA affected critical infrastructures was their inability to grow, pre technology meant that critical infrastructures would have been working haphazardly and wouldn’t have met.
the main focus of a infrastructure which is growth.
References
“SCADA Systems.” SCADA Systems, http://www.scadasystems.net/.
“IJCA.” NADIA, https://nadiapub.com/journals/ijca/.