Abstract

SCADA for National Critical Infrastructures: Review of the Security Threats, Vulnerabilities and Countermeasures

Highlights

  • IntroductionSupervisory control and data acquisition (SCADA) networks contain computers and applications that perform key functions in providing essential services and commodities (e.g., electricity, natural gas, crude oil, refined petroleum products such as gasoline, gas oil, water, waste. treatment, transportation) to citizens of a country

  • Supervisory control and data acquisition (SCADA) networks contain computers and applications that perform key functions in providing essential services and commodities to citizens of a country

  • Supervisory system is used as server for communicating between the equipment of the Supervisory Control And Data Acquisition (SCADA) system such as Remote terminal units (RTUs), Programmable Logic Controller (PLC) and sensors, etc., and the Humanmachine Interface (HMI) software used in the control room workstations

Read more

Summary

Introduction

Supervisory control and data acquisition (SCADA) networks contain computers and applications that perform key functions in providing essential services and commodities (e.g., electricity, natural gas, crude oil, refined petroleum products such as gasoline, gas oil, water, waste. treatment, transportation) to citizens of a country. They include - data acquisition, networked data communication, data presentation and control These four functions are performed by several kinds of SCADA components such as 1.) sensors (either digital or analog) and control relays. These directly interface with the managed system ; 2.) remote telemetry units (RTUs) are small-computerized units deployed in the field at single sites and locations. Numerous forms of malware targeting SCADA systems have been identified, including Stuxnet, Havex, and BlackEnergy3 [2] What these three forms of malware have in common is their ability to sneak through Industrial Control Systems (ICS) undetected by exploiting the weakest link in the cyber defense network (people) and posing as a legitimate e-mail or by finding a back door in the SCADA system. The power sector has already demonstrated itself to be vulnerable and must dedicate substantially more resources to closing back doors and training employees to avoid clicking on malicious files

Research Questions
Objectives of the research
Supervisory System
Communication Infrastructure
Remote Terminal Units
SCADA Programming
Architecture OF SCADA
SCADA and its role to critical infrastructure systems
Types of SCADA attack
SCADA System Threats and Vulnerabilities
Summary and Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.