Supervisory control and data acquisition (SCADA) is a system used to control infrastructure processes (gas pipeline, water treatment, etc.), facility-based processes (airports, space stations etc.), or industrial processes (production, manufacturing, refining power, etc.) (scadasystems.net). These systems are designed to monitor and control these different processes over entirety of large areas. Although this system is efficient in doing its job there are vulnerabilities that lie within SCADA systems. Human Machine Interface (HMI) is an instrument that gives processed information to the human operator, and this person uses the HMI to control processes (scadasystems.net). There are security measures that would have to go in place with allowing actual people to operate a device that aids in SCADA systems. Since the human operator has access to information derived from this system, it becomes vulnerable to being manipulated, or tampered with by the hands of those who are operating the device. SCADA vendors have found ways to mitigate this vulnerability by developing specialized industrial VPN and firewall solutions for SCADA networks that are based on TCP/IP (transmission control protocol/internet protocol). TCP/IP is a set of standardized rules that allow computers to communicate on networks such as the internet. Additionally, white-listing solutions are enforced due to their ability to stop unauthorized application changes (scadasystems.net). Using both solutions it minimizes the chances of a SCADA system being corrupted by physical forces. Implementing these technical enhancements along with the aspect of physical security allow the risk of systems being corrupted to decrease.
Another vulnerability that lies within these systems is the ability for the systems hardware to be corrupted by malware, spyware, ransomware and viruses. The reliability of the hardware for these systems has advanced & SCADA has included ways to mitigate this risk and vulnerability. It has included communication channels and redundant hardware, any kind of failing of the system will be identified and taken over automatically via backup hardware (scadasystems.net). This ensures that whatever bugs are interfering with the systematic processes are corrected before they do too much damage. These SCADA systems control processes that would impact people’s lives if it became tampered with and ineffective for use. It is beneficial that these backup hardware’s are in place so that the probability of a cyber-attack in lessened.