Nathan Edwards
Professor Aldabagh
CYSE 200T
SCADA Write-Up: 3/26/23
Critical infrastructure systems, such as, pipelines, irrigation systems, pump stations, sewage distribution, transportation systems, etc, face many vulnerabilities to cybercrime. For example, one vulnerability that these infrastructure systems face is weak security systems. These systems may have weak physical protection, all information on one port, devices that are hard to upgrade, weak passwords, or even just a few firewall options (SCADA Systems). Other vulnerabilities that these systems face is little to no protection against denial-of-service attacks, protocols that are too simple, and RTUs and PLCs being hard to upgrade (SCADA Systems). A RTU stands for a remote terminal unit in which it is connected to the physical equipment (SCADA Systems). RTUs then convert electrical signals that come from the equipment into digital values like pressure, flow, voltage, on/off, open/closed, etc. (SCADA Systems). PLCs stand for programmable logic controllers in which act the same as RTUs (SCADA Systems).
SCADA stands for Supervisory control and data acquisition and tries to prevent and mitigate these vulnerabilities from critical infrastructure systems. Elements of Supervisory Control and Data Acquisition consist of sensors and actuators, remote terminal units (RTUs), programmable logic controllers (PLCs), telecommunications, and SCADA clients and servers (SCADA Systems). The type of sensors and actuators that SCADA vary from a variety of ranges. For example, there are light, temperature, distance, wind, and water sensors (SCADA Systems). SCADA is also linked to the human machine interface (HMI). The HMI is an apparatus that gives processed data to the human operator as the human operator uses the HMI (SCADA Systems). SCADA also uses different types of actuators and alarms such as valves, pumps, and motors (SCADA Systems). PLCs are used to control manufacturing processes and communication compatibilities (SCADA Systems). The SCADA server consists of data logging, analyzing data, decision making, looks at the RTU for information, and stores information in case of a breach or disaster (SCADA Systems).
These elements of sensors and actuators, remote terminal units, programmable logic controllers, telecommunications, and SCADA clients/servers allow for the prevention and mitigation of cybercrime towards our critical infrastructure systems. However, as stated in the article there are two major threats to SCADA. One of these two major threats to SCADA is the unauthorized access to software, whether it be human access, viruses, etc. (SCADA Systems). The second major threat to SCADA is related to packet access to network on actual packet control protocol (SCADA Systems).
References:
SCADA systems. SCADA Systems. (n.d.). Retrieved March 26, 2023, from http://www.scadasystems.net/
(SCADA Systems).