SCADA systems are systems used to used to control infrastructure processes, facility-based processes, and industrial processes (SCADA). SCADA stands for supervisory control and data acquisition. In every SCADA system there is: a human operator, a supervisory system that contains all the required data about the process, Remote Terminal Units, Programmable Logic Controller, and Communication infrastructure that connects the Remote Terminal Units to supervisory system. There are many vulnerabilities that are associated with the critical infrastructure system. One of the most controversial incidents that affected critical infrastructure systems, both physically and cyber, over that past few decades was the 9/11 attacks. The ability to track, identify, or defend against many different threats to critical infrastructure have improved (Tal, 2018). A wide amount of surveillance equipment and cameras are usually connected to software and human operators surround almost every critical infrastructure site or facility. Although technologies have advanced to protect systems against vulnerabilities, so have the attackers and their abilities. SCADA has many ways of mitigating their risks. SCADA refers to centralized systems that manage and track the whole system, or complex systems that are dispersed over large areas(SCADA). Human Machine Interface is an apparatus that gives the processed data to the human operator (SCADA). For example, SCADA systems are constantly used in alarms. if your phone alarm is activated, messages and texts are sent straight to SCADA operators and managers. Remote terminal unit’s (RCU) are used to convert all electrical signals coming from the equipment into digital values so that they can be controlled. There are certain threats that cannot be prevented by SCADA. These threats include earthquakes, tsunamis, land shifting, volcanic eruptions, extreme weather (hurricanes, floods, draught), fires (Tal, 2018). Although these threats cannot be prevented, the systems set up by SCADA are made to alert operators of threats and disasters before they occur.
SCADA Systems. (n.d.). Retrieved January 08, 2021, from http://www.scadasystems.net/
Tal, J. (2018, September 29). America’s Critical Infrastructure: Threats, Vulnerabilities and Solutions. Retrieved January 08, 2021, from https://www.securityinfowatch.com/access-identity/access-control/article/12427447/americas-critical-infrastructure-threats-vulnerabilities-and-solutions