CYSE-200T The SCADA Systems Write-Up

In this write-up, we discuss SCADA systems. We define what they are, the security. vulnerabilities they have, and how they can best be mitigated. We will also discuss the importance of these systems and provide examples of them.
What is SCADA?
SCADA stands for “supervisory control and data acquisition”, they can be understood as what controls the operations of critical infrastructure. Examples of this are the water treatment process, facility-based processes such as within airports, and industrial processes such as factories and power generation. These all rely on real-time processing for sufficient operation, such as with remote terminal units, programmable logic controllers, or a human operator. SCADA is the system that controls and monitors these sorts of operations. For example, a SCADA system can alert to sudden temperature changes or if a leak is detected in a water pipeline.
Vulnerabilities
Many of the current generation SCADA systems can be accessed through the internet, which increases their vulnerability. There are a few vulnerabilities associated with these systems. For example, there is a lack of network segmentation. Network segmentation means separating devices on a network, such as pipeline control from refrigeration controls. This lack of security means that when an attacker penetrates a network, they penetrate the entire network. Second, there is a risk of unauthorized access to software. This can be by other humans, malware, or other viruses that can affect the control of the machine. Finally, outdated and vulnerable systems increase the risk of buffer overflow attacks, which intentionally overloads a system until it is forced to shut down. This is difficult to manage, as many SCADA systems cannot be easily shut down for patch maintenance.
Mitigating the Risk
Some of the ways that SCADA actors play a role in mitigating this risk is by implementing a strong, industrial VPN. Firewall solutions are also being improved specifically for SCADA networks. Network segmentation should also occur, so that an entire network is not shut down due to one compromise. Implementing a DMZ that separates the SCADA network from the rest of the enterprise would also be helpful. Vendors should also utilize whitelisting in order to ensure that unauthorized access does not occur. Employee and user training are always helpful in mitigating this risk in order to reduce the risk of compromise through phishing, or other social engineering tactics.
Conclusion
SCADA is an absolutely essential piece of critical infrastructure. Without secure SCADA systems, several things we use every day could be affected, like clean drinking water and temperature control in the building we sit in now. These systems can pose security challenges that must be understood and mitigated, they cannot easily shut down for updates like computers can. It is very important that SCADA vendors take these security measures into account.

References
Alanzi, M. Et. al, (2023), SCADA vulnerabilities and attacks: A review of the state‐of‐the‐art and open issues, Computers & Security, 125(14), https://doi.org/10.1016/j.cose.2022.103028


SCADA Systems – SCADA Systems. (n.d.). Scada Systems, https://www.scadasystems.net/

Leave a Reply

Your email address will not be published. Required fields are marked *