The SCADA system has a big role in keeping infrastructure related cyber threats at bay, but the systems are still vulnerable to things like unauthorized access and breaches in network (Scadasystems.net).
SCADA – Defined
Supervisory Control and Data Acquisition is what the acronym stands for. They are essential systems put in place to keep safe critical infrastructure. They are specifically referred to as industrial control systems, so they control infrastructure processes like water treatment, wastewater treatment, gas pipelines, and windfarms, but also include facility-based processes and industrial processes like airports, space station, ships, production, manufacturing, and power generation as well (Scadasystems.net). They allow operators to monitor and control information regarding infrastructure for big areas. If exploited, severe risks would be present if vulnerabilities are not thought of in advance (Scadasystems.net).
SCADA and Security Issues
Networked technology and a lacking of strong cybersecurity measures are what plague critical infrastructure systems. Many can be harmed from people who try to access the systems without proper access, either from a physical breach or via the cyber realm (Scadasystems.net). Human access which can introduce viruses can affect the control host machine but also packet access to network segments (Scadasystems.net). Directly acting with network switches or SCADA systems would possibly allow the intruder to override security, interact with data, or control the system. These interactions could cause disruptions in infrastructure like power or water (Scadasystems.net). Older style standalone systems without a connection to outside networks were initially used but the modern SCADA systems rely on TCP/IP communications, which brings in more exposure to cyber threats (Scadasystems.net). Because of this change, vulnerabilities lead to hacking, malware, or even cyberwarfare or cyber terrorism (Scadasystems.net).
SCADA Does Help the Situation
SCADA systems mitigate these vulnerabilities by utilizing things such as the RTU or remote terminal unit, programmable logic controllers, and human machine interfaces (Scadasystems.net). Immediate human intervention is possible when necessary and humans can read data from the RTUs which allows for monitoring in real time (Scadasystems.net). PLUs will automate actions relating to temperature and flow levels (Scadasystems.net). They also have redundancy measures in place to allow processes critical to operation to continue to operate regardless of a cyber threat or equipment failure. Vendors of SCADA have also included robust security features such as VPNs and firewalls to protect from unauthorized access. They are not perfect but do help the situation.
Conclusion
SCADA systems play a significant role in protecting critical infrastructure despite the vulnerabilities they come with. Ideally, technological advances will continue to work against the advances in cyber threats. It is essential for this to be successful to ensure uptime and protection of essential services, which will protect the public in general.
References
- SCADA systems. SCADA Systems. (n.d.). https://www.scadasystems.net/