Write Up: SCADA Systems

When it comes to SCADA its role is to monitor and control critical infrastructure like when it comes to the power grid, water treatment facilities, oil pipelines, and transportation systems. When it comes to this system it happens to collect information in real-time and this data it collects is from the field device which are RTUs and PLCs. Then on top of that, it will present it to a human operator through the HMI which then will enable timely responses when it comes to abnormal conditions for example equipment failure, pressure changes, or overheating. When it comes to SCADA there are problems too that happen to rely on standardized protocols and network connectivity and as a result, they are targeted to common threats like unauthorized software access, manipulation, and packet-based attacks. On the physical side, they can use switches or jacks that can bypass the software protection. My research does show it as it says this “Many SCADA systems were originally designed for isolated environments, which means they may lack robust authentication protocols. This deficiency can allow unauthorized users to access and manipulate system controls.” (Amos, 2022). This just shows it does have weaknesses when it comes to SCADA like it doesn’t have encryptions when you do use SCADA which isn’t safe when it comes to your work. Besides all this, I believe that SCADA can have problems but they do have essential tools that we use even if it problem they help us do the daily work we do.

Amos, Z. (2022). 9 SCADA System Vulnerabilities and How to Secure Them. Isa.org. https://gca.isa.org/blog/9-scada-system-vulnerabilities-and-how-to-secure-them