SCADA

I had no clue what SCADA meant but reading about what SCADA is, it makes sense. In lamest terms SCADA acts like an auto-piolet system. It does the job of the user so that the user can do something else. SCADA can be used in any line of work for different reasons. For example SCADA can be used at a floral companies with multilabel green house location. SCADA can be used to monitor and adjust temperatures at all green house location for one source. But with that method of work there can be problems. A risk that SCADA can be high rate of is lack of monitoring. Not keeping a constant eye on faculties or network can create a lot of chances for open doors. That lack of monitoring results in no updates, no patch fixing and no proper authorization. Then this leads to high risk events. As most Scada systems lack an active network system, they often fail to detect suspicious activities or to provide a proper reaction when a cyber attack does happen. Another weakness is their ability to segregation departments and work fields. This is one of the most common factors that can compromise an ICS. When the facility allows inadequate segregation between their IT and their OT environments, then they may unintentionally allow a machine connected to their IT network to reach a device on their ICS network. This then allows a malware attack on the IT system to spread to the OT set up easily. Then security if not done properly can be a vulnerable to SCADA. Proper authentication is key. Knowing who or what is adjust your network or system. If something modified be it human access or intentionally induced changes, virus infections or other problems that can affect the control host machine. Ways that these risk can be mitigated is simple if done right. First to address the security problem, strength security. This mean, having more then one form of authentication. Assigning right to information from public information to classified information. Then for the lack of monitoring problem. Increase monitoring also. This includes camera, administrators, work groups, lock or default setting. Forms of access that is something needs to be changed it will be but under proper authentication

Leave a Reply

Your email address will not be published. Required fields are marked *