{"id":295,"date":"2024-11-15T03:00:49","date_gmt":"2024-11-15T03:00:49","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nicholascarter\/?page_id=295"},"modified":"2024-11-15T03:33:11","modified_gmt":"2024-11-15T03:33:11","slug":"scada-systems-write-up","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/nicholascarter\/scada-systems-write-up\/","title":{"rendered":"SCADA Systems Write Up"},"content":{"rendered":"\n<p>Nicholas Carter, 10\/31\/2024<\/p>\n\n\n\n<p>ICS stands for Industrial Control System and is used to control industrial systems with hardware and software. There are a lot of problems that can come from Industrial Control Systems such as\u00a0 unauthorized access, malware attacks, hardware failures, and insider threats. (Martel, 2022) SCADA is the Supervisory Control and Data Acquisition which is the system used in a lot of different Industrial Control Systems. (<em>SCADA systems<\/em> 2024) SCADA systems use human machine interfaces, supervisory systems, remote terminal units, programmable logic controllers, and communication infrastructures to mitigate many of the vulnerabilities found in ICS.<\/p>\n\n\n\n<p><strong>HMI (Human Machine Interface)<\/strong><\/p>\n\n\n\n<p>The human machine interface in a SCADA system is the system that operator\u2019s use to interact with the SCADA system. (<em>SCADA systems<\/em> 2024) This is helpful because the information and diagnostics get shown directly in front of the user and they can have a live play by play of what is going on in the ICS. Having a HMI helps detect any live problems and gives the operator the chance to get ahead of it and intervene if need be.<\/p>\n\n\n\n<p><strong>Supervisory System<\/strong><\/p>\n\n\n\n<p>A supervisory system is responsible for collecting and processing data, then using the data to communicate with the different field equipment. (<em>SCADA systems<\/em> 2024) Having a supervisory system is incredibly efficient because it disperses information very quickly and effectively on a live basis. A lot of supervisory systems have multiple servers and a set formation in place. This also helps the system operate with redundancy and control to ensure that even in the event of an attack the system still can run smoothly.<\/p>\n\n\n\n<p><strong>RTU (Remote Terminal Unit)<\/strong><\/p>\n\n\n\n<p>An RTU is a device that connects directly to equipment to collect data and turn it into values. The RTU is also used to set what value the machine should be operating at. (<em>SCADA systems<\/em> 2024) This is incredibly useful since it provides a high level of consistency in an ICS and gives a direct account of what is going on with each piece of equipment. The RTU is helpful because in the event of failure they are easily stopped or can help keep things running.<\/p>\n\n\n\n<p><strong>PLC (Program Logic Controller)<\/strong><\/p>\n\n\n\n<p>A PLC is used to run complex processes on field equipment. By using a PLC, processes that would normally be strenuous are done automatically and can receive and send signals. Having the PLCs mitigates a lot of human error that would typically take place.<\/p>\n\n\n\n<p><strong>Communication Infrastructure<\/strong><\/p>\n\n\n\n<p>The communication infrastructure is what is responsible for helping the RTU\u2019s communication with the supervisory system. (<em>SCADA systems<\/em> 2024) If it was not for the communication infrastructure, then there would be a gap in the amount of time information could be found out and processed. By having an effective communication infrastructure there is a high likelihood that any hardware failures or attacks get picked up immediately.<\/p>\n\n\n\n<p><strong>SCADA System Vulnerabilities<\/strong><\/p>\n\n\n\n<p>While the SCADA system does stop a lot of common vulnerabilities that take place in an ICS there are still some vulnerabilities that need to be worked on. The biggest one is a possible insider threat. By whitelisting and keeping tabs on the activities of users the company can trace and stop many inside attacks from occurring. Another key point for the SCADA system to work is always staying up to date with software and hardware. The last thing that needs to be done is to keep the system behind VPNs and firewalls to mitigate cyber threats that may be attempting to work its way through. (<em>SCADA systems<\/em> 2024)<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>The SCADA system is very useful for mitigating risks in an ICS. While there will always be vulnerabilities present the SCADA system uses a blend of hardware, software, and human intervention to keep the ICS from being vulnerable to system failures.<\/p>\n\n\n\n<p>Citations:<\/p>\n\n\n\n<p><em>SCADA systems<\/em>. SCADA Systems. (n.d.). https:\/\/www.scadasystems.net\/<\/p>\n\n\n\n<p>Martel, H. (2022, November 11). <em>Top 25 ICS vulnerabilities<\/em>. automation.com. https:\/\/www.automation.com\/en-us\/articles\/november-2022\/top-25-ics-vulnerabilities<\/p>\n\n\n\n<p><br><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nicholas Carter, 10\/31\/2024 ICS stands for Industrial Control System and is used to control industrial systems with hardware and software. There are a lot of problems that can come from Industrial Control Systems such as\u00a0 unauthorized access, malware attacks, hardware failures, and insider threats. (Martel, 2022) SCADA is the Supervisory Control and Data Acquisition which&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/nicholascarter\/scada-systems-write-up\/\">Read More<\/a><\/div>\n","protected":false},"author":29694,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nicholascarter\/wp-json\/wp\/v2\/pages\/295"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nicholascarter\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nicholascarter\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nicholascarter\/wp-json\/wp\/v2\/users\/29694"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nicholascarter\/wp-json\/wp\/v2\/comments?post=295"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/nicholascarter\/wp-json\/wp\/v2\/pages\/295\/revisions"}],"predecessor-version":[{"id":310,"href":"https:\/\/sites.wp.odu.edu\/nicholascarter\/wp-json\/wp\/v2\/pages\/295\/revisions\/310"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nicholascarter\/wp-json\/wp\/v2\/media?parent=295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}