SCADA Systems

BLUF(Bottom line up front)-
What are the vulnerabilities with infrastructure systems and what role does the SCADA
take part in minimizing the threats? Threats with these types of systems are uncertified
admission and individuals sending messages to their devices can gain authority over it. In
this writing, I will go into further depth on these two topics.
⇨Role of SCADA:
SCADA stands for supervisory control and data acquisition, in which the systems are meant to
make sure the electricity, water, gas, as well as other systems are being provided and maintained.
It consists of computer systems, and its goal is to manage plus watches over the data.(SCADA
Systems, 2023)
Vulnerabilities Associated:
There are cyber threats that mess with the computer services. Some of the solutions that SCADA
utilizes are firewalls, as well as creating solutions that block access and application control to
prevent hackers from gaining access. (Biswas, 2022) So since the SCADA systems do use
protocols, they are automatically put at risk for more cyber threats.
Conclusion:
The overall system they use includes HMI, Data Control, PLC, and equipment (Dpstele,
2023). The communication networks help with connecting them to remote sites and they also use inputs.
Another thing they utilize are RTU’s just to make sure everything is connecting & processing the way it is supposed to. In conclusion, SCADA uses techniques to avoid attacks and people from breaking into their data and devices.

Leave a Reply

Your email address will not be published. Required fields are marked *