Write Up: SCADA Systems
SCADA: A Useful System for Business
Intro to SCADA
SCADA is an acronym for supervisory control and data acquisition(SCADA Systems). SCADA
systems comprise of hardware and software used to control infrastructure processes. This allows
organizations to monitor and control properties such as the site of a plant. What makes SCADA
convenient is the fact that it can be controlled both locally and remotely. Some of the best
features of SCADA include the ability to collect , process, and examine data all at once.
Components SCADA Systems
Human Machine Interface(HMI) software controls contact between devices such as motors ,
sensors ,and valves. A standard of every SCADA system contains a remote terminal unit (RTU)
or programmable logic controllers (PLC). These components of a SCADA system collect data
and act as a bridge between the motors , sensors , valves, etc. The communication data collected
is then sent to SCADA computers where someone is able to analyze and react to changes within
the systems(Sivaranjith). These components ultimately made it easier to motor and control
processes within sites such as plants.
SCADA Vulnerabilities
Although SCADA may be more convenient , as people’s understanding of technology has
developed, SCADA vulnerabilities are starting to show. The lack of an active network system
has left SCADA vulnerable to cyber attacks. Without an active network system it becomes
difficult to notice a cyberattack or react to one(Paganini). These types of cyber attacks could also
be a product of human error. Without a proper understanding of the traffic that runs through the
network, this lack of knowledge for the advanced data makes it hard to react to a cyber attack.
Authentication is another factor that leads to cyber attacks, an example of this would be a weak
password or method of authentication.
Mitigating Risk
Reducing the total number of hardware components would aid in minimizing the risk of a cyber
attack. Getting rid of hardware that is more of a risk than beneficial eliminates the risk of a virus
or unauthorized access(Lutz). Implementing a strong form of authentication would go a long way
in minimizing the risk of a cyber attack. This makes it harder for hackers to gain access to data
and information. Using a firewall would not only protect against hackers but also viruses.
Conclusion
Some of SCADAs main primary functions are to monitor, process , analyze , and display data
collected. Although SCADA has many vulnerabilities I believe that with the right risk
management precautions, the chances of a cyber attack are very unlikely. Just like everything
related to technology, nothing is perfect and has the risk of being compromised. Like I said in an
earlier example , the best way I could explain SCADA to someone who is unfamiliar with the
topic would be that SCADA is like the bridge between collected data and an organization.
Overall I feel as though SCADA has more pros than cons and is effective in identifying and
reacting to cyberattacks.
References:
Lutz, Natashia. “Managing Scada Complexity – Minimizing Risk.” VTScada by Trihedral,
17 Apr. 2018, https://www.vtscada.com/managing-scada-complexity-minimizing-risk/.
Paganini, Pierluigi. “Improving Scada System Security.” Infosec Resources, Infosec
Resources, 14 Oct. 2020, https://resources.infosecinstitute.com/topic/improving-scada-
system-security/.
“SCADA Systems.” SCADA Systems, http://www.scadasystems.net/.
Sivaranjith. “Components of SCADA.” Instrumentation and Control Engineering, 11 Feb.
2019, https://automationforum.co/components-of-scada/.