SCADA Systems
Critical infrastructures are physical and cyber systems that are so vital to the organization or a country that their destruction or malfunction will lead to disruption of essential services such as public health and economic security and subject organizations to huge financial losses. In industrial setups, the most critical infrastructures are SCADA-based systems such as mass transit systems, manufacturing plant systems, and power grid systems. SCADA systems are usually deployed in such systems to automate data collection and control of processes (Tariq et al., 2019). Nowadays, these systems have become high-value targets for attackers looking to disrupt business operations. Cyber attackers are exploiting vulnerabilities networks and the internet that form a major part of SCADA systems. Fortunately, there are security measures that can be implemented to strengthen the capability of the systems to handle the attacks. The main vulnerabilities include networking of SCADA systems, the use of networking protocols, and the best way to improve security is the isolation of SCADA systems from other network connections and providing additional levels of protection.
There is no doubt that SCADA systems are in modern times more vulnerable to cyber-attacks because of the exposure over the internet. Most SCADA systems have now been digitalized and connected to the internet to integrate them with other platforms, expand operations, and make their access easier. Some vendors are even offering application-specific SCADA control systems that are hosted in remote locations with the help of the internet. Most of these systems do not need to be installed at the end-user facility (“SCADA Systems”). However, this has come with a huge expense since cybercriminals are now utilizing security loopholes on the internet to access sensitive information. The internet is the first place hackers go. Even when the facility deploys reliable security for the internal network, attackers can still access sensitive data being transmitted to remote locations.
The use of standard WAN protocols such as TCP/IP in traditional SCADA systems makes SCADA communication to be vulnerable to external attacks. TCP and IP are open protocols that cyber terrorists operate from remote locations without any difficulty. Modern SCADA systems usually come with specialized protocols like Modbus RTU and Profibus but would require existing Ethernet connections to communicate with remote sites. Most of these connections would require TCP/IP protocols, which are more vulnerable to cyber threats. With IP communications, attackers no longer need to gain physical access to analog circuits that are normally used as a protection measure for SCADA systems. They only need to bypass password authentication or listen to communications over the TCP/IP protocol and execute their attack.
The role SCADA applications play to mitigate these risks in critical infrastructure is applying advanced security measures to lessen vulnerabilities between the SCADA network and the corporate network. One way it does so is by implementing its own protocols to be used between RTUs and master stations. SCADA systems have implemented modern communications that use a combination of direct and serial radio communication to meet communication and security needs. Besides, SCADA systems have been isolated business systems and made to operate independently via the operational network (Kim, 2012). When there are no connections to vulnerable systems, they are least vulnerable to external cyber-attacks. Modern SCADA systems have also implemented multi-layered security systems that involve the use of technologies and intrusion detection systems such as firewalls and password authentication.
In conclusion, critical infrastructures suffer from multiple vulnerabilities with exposure over the internet being the leading vulnerability. Most critical infrastructure systems with SCADA systems still use public computer networks to communicate with remote sites. This makes them vulnerable to cyber-attacks that can be easily done through the internet. Another major risk is the integration of SCADA systems with TCP/IP protocols. SCADA systems try to counter these vulnerabilities by implementing independent protocols and own networks.
References
Kim, H. (2012). Security and vulnerability of SCADA systems over IP-based wireless sensor
networks. International Journal of Distributed Sensor Networks. doi:10.1155/2012/268478
“SCADA Systems”. http://www.scadasystems.net/
Tariq, N., Asim, M., & Khan, F. A. (2019). Securing SCADA-based Critical Infrastructures:
Challenges and Open Issues. Procedia Computer Science, 155, 612–617.