What is SCADA in Cyber Security?


What is SCADA in Cyber Security?

Introduction

SCADA is one of the most dangerous cyber security threats. It is an acronym for Supervisory Control and Data Acquisition, which are computer systems that control industrial processes in power plants, oil refineries, chemical plants, and other industries. Cyber attacks on these systems can cause large-scale disruptions to production or even catastrophic explosions. The term was coined by a Canadian company called ASEA Brown Boveri (ABB) who used it as a name for their own supervisory control system developed in 1968.

SCADA systems are generally used to monitor and control physical processes, such as manufacturing or power generation. They usually communicate with their interfaces (sensors and actuators) over serial connections like RS232 or UDP/IP like Modbus / IP, ISDN BRI, WiFi, etc. Generally, its communication protocols are based on specific vendor protocols.

What is SCADA in Cyber Security?

SCADA stands for Supervisory Control and Data Acquisition. Computers allow SCADA to use a network to transfer data from a remote device. SCADA devices are typically used to monitor and control industrial systems such as those in power plants or pipelines. SCADA systems can also be used for traffic management, airport control towers, etc.

SCADA was originally developed to facilitate the transfer of data from a remote device back to the main computer system. Today they have grown increasingly more complex and allow for dynamic changes in industrial processes as well as automation or self-controlling systems. In most cases, there is no direct interaction between devices as the connection is all done via network messages.

How does it work?

There is usually a general controller (SCADA system) that operates the control system which is usually made up of distributed processes, such as sensors and actuators. The controllers themselves transmit information through a network to the SCADA system, which also receives input from other sources, such as operators and workstations, and displays and archives data.

A SCADA system has both programmable logic controllers (PLCs) and dedicated hardware controllers. It can be implemented on either centralized computer systems or virtual servers. The SCADA system can provide graphical information that displays their statuses, such as those for power generation or chemical plant production.

What are the pros/cons of SCADA as a security system?

The pros of using SCADA are that it provides the operator with all information in real-time. The SCADA system also allows different systems to communicate with each other, so if there are any issues, they are detected with minimal delay. The cons are that SCADA is made up of different systems with interdependencies which means if one component fails, it may affect the whole system. SCADA systems are also not designed to withstand cyber-attacks.

The pros of using SCADA when it comes to cyber security are that there are different levels of access. For example, when a company wants to put its systems together for safety purposes, different departments will have limited access depending on what they need to do. The cons are that it is very hard to maintain security as SCADA systems are not made with internet connectivity or malware protection. It is also difficult to monitor what different users do as they have the ability to run unauthorized software on their computers and tampering with data is harder to detect.

What are the types of SCADA systems?

There are three types of SCADA systems, function-oriented, distributed control system (DCS), and industrial control system (ICS).

A function-oriented SCADA is an individual program that controls one machine or process.

The DCS is made up of different components that operate under common control.

An ICS is a combination of control systems that manage an industrial facility or process, the biggest example being power grids and water management systems.

Who is using it and why?

Many companies and businesses that need to monitor and control their industry and operations use SCADA systems. These systems can also be used in the home to control smart appliances such as stoves, washing machines, and other things. It is a really powerful system because it has access to electric power, gas, water, and other sources of energy.

The system was created to help researchers measure the different variables in the environment such as temperature, rainfall, wind speed, etc. The equipment monitors changes in these variables so that they can send reports about them back to the scientists who work on them. This makes it possible for researchers to see the results of their work in different areas around the world.

Conclusion

SCADA is a system that monitors and controls industrial processes such as power plants, oil refineries, chemical plants, water treatment facilities. SCADA systems are also used for other purposes including traffic control and monitoring of natural resources like forests or fisheries. The primary purpose behind these systems is to provide remote access so human operators can monitor the status of machines in real-time without having to be present at the machine location (hence why they’re often referred to as “supervisory” control).  Although this technology has made it easier for humans to manage complicated tasks remotely, there are some drawbacks to using SCADA-based security systems. One drawback is that if the data stream between an operator’s workstation and their process input/output (I/O) devices is interrupted, the system halts. These systems rely on data being transmitted in real-time, so any network latency or connection problems cause the process to come to a screeching halt.

Recent Posts