Critical Infrastructure systems are systems that “are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security”, according to the Cybersecurity and Infrastructure Security Agency. They consist of systems that control important resources like water, oil, and gas or processes like transportation, manufacturing, or power production. Due to these systems being required to keep the US functioning, they should be some of the most secure running systems within the US. However, they have their fair share of vulnerabilities that could cause numerous problems should they be exploited. SCADA systems are designed to control these critical infrastructure systems and protect them against possible vulnerabilities. One such vulnerability would be possible harm or even death done by the failure of control systems, as dangers like high voltage can result in the loss of life. SCADA systems help prevent this by ruggedizing hardware to withstand natural conditions that could harm humans, as well as identifying the failing part and taking over it through backup hardware automatically. This allows the system to continue working without being interrupted while still allowing the part to be identified and eventually replaced, according to the article by scadasystems.net. However, security risks to critical infrastructure typically come in two different varieties, the first being unauthorized access to the software. The second is the fact that there is very little security relating to packet control, meaning those with physical access to network switches can possibly control SCADA systems, according to the same article mentioned before by scadasystems.net. While these vulnerabilities are dangerous, there are a few ways to defend against their possible exploitation, such as VPNs or firewalls that are designed specifically for SCADA networks based on TCP/IP. Another solution would be to implement whitelisting to ensure that only approved users are allowed access to sensitive software, eliminating most of the possibility of bad actors taking advantage of critical infrastructure systems.
Sources
“Critical Infrastructure Sectors.” Cybersecurity and Infrastructure Security Agency CISA, https://www.cisa.gov/critical-infrastructure-sectors.
“SCADA Systems.” SCADA Systems, http://www.scadasystems.net/.