SCADA Article

SCADA are systems made in order to monitor and control various infrastructure systems. Some of the infrastructure systems include power plants, water treatment facilities, and transportation networks. In some cases, these systems can be complex and interconnected. This causes them to be vulnerable to cyber attacks leading to damage or disruption of their services. 

SCADA systems come with many vulnerabilities. Critical infrastructure systems, are “the assets, systems, and networks, whether physical or virtual, so vital to the United States that their incapacitation or destruction would have debilitating effects on security, national economic security, national public health or safety” (SCADA). These infrastructures are prone to cyber-attacks because of their outdated systems and security measures. They rely on computer programming languages like Pascal and C. Due to these two factors, critical infrastructure systems usually do poorly when protecting themselves from hackers. The power grid is also vulnerable because complex computer systems are using shared technologies across multiple companies making it an attractive target for malicious hackers due to the impact that they can cause on direct lives. 

I believe that in order to mitigate these risks, SCADA systems must properly be secured with modern practices. SCADA systems were created before cloud-based technologies. I find it crucial that cloud-based technologies would create a better security measure because includes automated updates, identity management solutions, and security monitoring tools. It would be a great idea for companies to invest in SCADA applications that integrate state-of-the-art cyber security measures and use automation technology to help eliminate human error. Human error is the leading cause of cyber attacks from happening. Therefore, it is crucial to mitigate that risk by providing adequate resources. SCADA Systems help mitigate the risks associated with these attacks by monitoring and controlling the flow of data through a critical infrastructure system in real-time. Also, SCADA must provide the employees with administrator permission in order to be able to download and create certain things on their computers. That is a necessary action to take in order to avoid any attacks from happening. 


SCADA is a necessary action to take in order to ensure that there are proper security measures in place. These security measures would help mitigate any possible threat from occurring. Allowing us to recognize the vulnerabilities and the mitigations necessary to avoid issues from happening is crucial in making sure the systems remain secure.

Leave a Reply

Your email address will not be published. Required fields are marked *