SCADA Systems

SCADA systems are industrial control systems used to control infrastructure and industrial processes and typically is connected to the network, allowing the system to coordinate different processes. SCADA systems play a vital role in aiding risk mitigation, but the fact they are on the network leaves them vulnerable to cyber attacks. When it comes to these attacks, core infrastructure is typically the most vulnerable due to the massive impact an attack or outage would have on the residents of the area. Core infrastructure includes energy, water, transportation, and healthcare systems (Labus, 2022)


SCADA systems utilize a variety of subsystems which are coordinated in real-time by the main system to ensure critical infrastructure is running smoothly. These subsystems include supervisory systems that gather required data relevant to the process, human operated apparatuses which present the operator with processed data, Remote Terminal Units (RTUs) that convert information into digital data, Programmable Logic Controllers (PLCs), and communication devices to connect RTUs to the supervisory system (SCADA Systems, p.1). SCADA has been proven to keep critical infrastructure running smoothly, but there are some concerns over the security of these systems and the possible ramifications of unauthorized access and cyber attacks.


In the past, it was believed that SCADA systems were protected enough because they were secured physically and generally disconnected from the internet. Today however, more and more SCADA systems and associated technologies are connected to the network, making them vulnerable to cyber attacks. It’s very conceivable that a malicious actor could bypass the system’s VPN and firewall and gain access to the system and have control over certain processes. For instance, they may block or delay the flow or transmission of data through the control networks or possibly make changes to the code of programmed instructions in PLCs and RTUs (Robles et al., p.3). Such attacks on core infrastructure could lead to far reaching consequences and have the potential to cripple national security, international trade, impact global economies, and have implications on international relations (Labus, 2022).


While the use of SCADA systems does mitigate certain vulnerabilities, the threat posed by cyber attacks is too great not to consider and work towards better safeguards. Healthcare systems, power grids, telecommunication providers, power plants, financial markets, and other critical sectors rely on these systems to function on a daily basis. Any disruption or downtime could have dramatic consequences, so it’s crucial that cybersecurity professionals focus on safeguarding these assets and mitigate the risk of cyber crime on critical infrastructure.

References


SCADA Systems. https://docs.google.com/document/d/ 1DvxnWUSLe27H5u8A6yyIS9Qz7BVt_8p2WeNHctGVboY/edit#

Labus, H. (2022). The massive impact of vulnerabilities in critical infrastructure. HelpNetSecurity. https://www.helpnetsecurity.com/2022/03/15/critical-infrastructure-security/

Robles, R., Choi, M., Cho, E., Kim, S., Park, G., Lee, J. Common Threats and Vulnerabilities of Critical Infrastructures. International Journal of Control and Automation. http://article.nadiapub.com/IJCA/vol1_no1/3.pdf

Leave a Reply

Your email address will not be published. Required fields are marked *