SCADA Systems

03 November 2024 – Jonathan F. M. Reyes

Bluf

SCADA systems do not eliminate cyber threats to critical infrastructure but can minimize damage by centralizing data and controls onto a digital monitor, allowing supervisory control in one location. Centralizing data and controls to one location also reduces the time it would take to independently monitor and respond to each component of an industrial system.   

SCADA

            Critical infrastructure systems vulnerabilities, according to Toledano (2024), “can be the result of design flaws, coding errors, misconfigurations, or outdated software” (c. 3). If a system does contain design flaws or is misconfigured, then it can cause damage to an entire system.

SCADA RTUs work as digital logs to monitor normal operations and “send the data to the supervisory stream” (SCADA systems n.d.) to alert operators of anomalies. Anomalies can cause a system not to work as intended or designed due to the former vulnerabilities listed or a cyberattack. A quicker alert of an anomaly results in a faster response and recovery time. SCADA’s remote capabilities allow its user to close/stop/shut down specific system components when it is out of perimeter readings. The SCADA system also automatically adjusts systems that have been overlooked if a person reads a reading. This helps eliminate human errors that could been caused by complacency.      

Conclusion

            SCADA systems are still prone to human error if an operator is unaware of how to respond to alerts from the system. However, SCADA still reduces the amount of personnel needed to monitor a whole system with up-to-date reports. Personnel would still be required for the physical security of infrastructure.

Reference

Tolendano, S. A. (2024). Critical Infrastructure Security Cybersecurity Lessons Learned from Real-World Breaches (1st ed.). Birmingham : Packt Publishing.

SCADA systems (n.d.). SCADA Systems. Scadasystems.net. https://www.scadasystems.net/

Leave a Reply

Your email address will not be published. Required fields are marked *