SCADA System Security Issues Overview

For reasons of efficiency, maintence, and economics, data acquisition and control platforms have migrated from isolated in-plant netwoeks using proprietary protocols, and the internet. The downside of this transition has been to expose SCADA systems to the same vulnerabilities and threats that plague Windows-based PCs and their associated networks. Some typical attacks that might be mounted against SCADA systems that employ standard hardware and software are listed here:
Image Saurce: gcn.com

- Malicious code such as viruses, trojan horses, and worms
- Unauthorized disclosure of critical data
- Unauthorized modification and manipulation of critical data
- Denial of service
-  Unauthorized access to audit logs and modification of audit logs

Terminology of PLCs
The L3GD203-Axis Gyro
Introduction To Robotics
Classification Of Robotics
SCADA System Architecture 

Most SCADA system, paticularly the local PLCs or controllers, have ro operate in real-time or near real-time environments. Thus, they cannot afford delays that might be caused by information security software and that interfere with critical control decisions affecting personnel safety, product quality, and operating costs. Also, plant SCADA system components do not usually have excess memory capacity that can accommodate relatively large programs associated with security monitoring activities.

In summary, controversional information technology (IT) systems are concerned with providing for internal and external connectivity, productivity, extensive security mechanisms for authentication and authorization, and the three major information security principles of confidentiality, availability, and integrity. Conversely, SCADA systems emphasize reliability, real-time response, tolarance of emergency situations where passwords might be incorrectly entered, personel safety, product quality, and plant safety.

Retyped from book Scuring SCADA System By Ronald L. Krutz. PhD. Wiley.
Image Saurce: www.wiley.com


Remote Communications Networks
SCADA Host Sofware
SCADA Security
Conclusion of SCADA 
About Slave-to- Slave Messaging SCADA

Comments

  1. Nice blog... Thanks for sharing all information on SCADA system security and SCADA audit. I found this information very helpful.

    ReplyDelete

Post a Comment

Popular posts from this blog

Tips Lulus Psikotes

Penyebab tidak bisa mengupload program ke Arduino

Memperbaiki Charger Laptop (Terputus)