Scada

A SCADA system is a collection of both software and hardware components. It allows for super vision from both local sources and remote control sources. It stands for Supervisory control and data acquisition and is used in places like the airport, powerplants, ships, water treatment plants, and anything that has to do with infrastructure processes, facility-based processes, and industrial processes. The SCADA systems do not control processes in real-time but can examine data and coordinate processes in real-time. The SCADA system also comes with the ability to archive data witch allows users to track new or chronic problems. SCADA systems use remote terminal units (RTU’s) and or programmable logic controllers (plc’s). These allow for any changes to be recorded and displayed. Before the SCADA systems people would have to wait and watch the process through eyesight, selector switches, buttons, and dials, this means that plants would have to maintain personal at all times to control and watch over the process. Scada effectively eliminates the need for 24/7 personal witch cuts cost down to a company and takes out human error so it’s less likely someone would make a mistake or get hurt. Although it does cut down on personal Scada does still need human interaction though. It has a human-machine interface that feeds data to the human operator and allows for him/her to make decisions on troubles hooting.There are two levels to the SCADA system alarm and normal and when the alarm requirements are met it will go off and alert the human operators on what is happening. The security of SCADA systems is questionable, they are potential targets of cyber-attacks and cyber-terrorism. It is widely believed that they are safe because they are disconnected from the internet but that is not true. They can still be at risk through unauthorized use of software which can lead to changes,viruses, and other problems that can hurt the host machine. Another threat is packet access to network segments that host SCADA devices. In a lot of cases, there is a lack of protection on packet controls witch leaves this wide open for anyone to send packets and to try and take control of the SCADA. SCADA vendors have started to combat this risk by issuing built-in industrial VPNs and firewall solutions for networks. They are also implementing whitelisting applications to block unauthorized changes

Leave a Reply

Your email address will not be published. Required fields are marked *