Preview

Scada

Powerful Essays
Open Document
Open Document
5413 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Scada
SCADA Systems Security
Arjun Venkatraman arjun.dhanush@gmail.com

1. Abstract The purpose of this paper is to define what SCADA systems are and their application in modern industry and infrastructure, to elucidate the reasons for rising concern over the security of these systems, to analyze the fundamental vulnerabilities and to put forth recommendations for the implementation of security in these systems.

2. Introduction: Supervisory Control and Data Acquisition systems are basically Process Control Systems (PCS), specifically designed to automate systems such as traffic control, power grid management, waste processing etc.

3. Application Control systems are used at all levels of manufacturing and industrial processing. A manufacturing plant that employs robotic arms will have a control system to direct robotic arms and conveyor belts on the shop floor. It may use that same system for packaging the finished product and tracking inventory. It may also use a control system to monitor its distribution network. A chemical company will use control systems to monitor tank levels and to ensure that ingredients are mixed in the proper proportions. A Las Vegas casino will use control systems to direct the spray from water fountains in coordination with the lights and music. Control systems are also used in the drilling and refining of oil and natural gas. They are used in the distribution of water and electricity by utility companies, and in the collection of wastewater and sewage. Virtually every sector of the economy employs control systems at all levels. The term "supervisory control and data acquisition" (SCADA), however, is generally accepted to mean the systems that control the distribution of critical infrastructure public utilities (water, sewer, electricity, and oil and gas). SCADA systems are still to come into widespread infrastructural use in India. In this country they are being used primarily for automation in industrial production, and to some



References: Barton Gellman, Washington Post, June 27, 2002; Page A01 5) 5)

You May Also Find These Documents Helpful

  • Best Essays

    Aircraft Solutions Project

    • 2440 Words
    • 10 Pages

    The purpose of the report is to assist Aircraft Solutions (AS) in indentifying the most significant Information Technology (IT) security vulnerabilities. AS products and services are at the forefront of the industry and the protection of such is very important as they are an industry leader. The vulnerabilities that will be discussed are the firewall configuration, virtualization of their hardware assets and defining security policy regarding the timeliness of firewall configuration and updates.…

    • 2440 Words
    • 10 Pages
    Best Essays
  • Powerful Essays

    ITNE455-1204A-01 U3GP3

    • 5030 Words
    • 21 Pages

    Security is embraced by the executive management staff at MJD Electronics. An important task for the Chief Security and Compliance Officer for MJD Electronics is to outline a plan that makes considerations for many of the important aspects of valid security architecture. This discussion presents more detailed information on many topics that should be included in a solid security architecture including border routers, demilitarized zones, proxy firewalls, access control lists and filters, fail-safe equipment, and more.…

    • 5030 Words
    • 21 Pages
    Powerful Essays
  • Better Essays

    Hilcrest Auto Case

    • 973 Words
    • 3 Pages

    control is especially critical in the automotive supply industry. One reason is that there are only…

    • 973 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Quiz 3 Bus 430

    • 573 Words
    • 6 Pages

    _______ involves computer control of a manufacturing process, such as determining tool movements and cutting speeds.…

    • 573 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    What are the different types of control systems? What are some advantages and disadvantages of the various control mechanisms? How does your organization use the steps of the control process?…

    • 543 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Organizational Review of Plant Automation Group It is intended that this organizational review, will provide the Districts with a better understanding of the changing process computer hardware and software support needs. Also to review the department location for the Plant Automation Group (Group), and develop recommendations on the proposed reporting relationships. ¨ Review the background information. ¨ Identify the primary and secondary functions of the Plant Automation Group ¨ Review possible location of the Plant Automation Group.…

    • 1682 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    be in place that will be both reactive and proactive in reaching the aims of the…

    • 755 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    * Software systems are available to help control CM and the database is referenced. Software packages available include a ticketing system. When a change needs to happen that could have an impact on any of the systems, it is vetted through all the owners of the various systems. It focuses around accountability. Who has done what, and who has permission to alter the configuration. Approval not given for a change until the ticket makes a round robin of every department to assure systems are not affected.…

    • 748 Words
    • 3 Pages
    Better Essays
  • Good Essays

    The most obvious form of discrimination in To Kill a Mockingbird is racism; however, there are other types of prejudice and discrimination that typify relationships among the novel’s characters. Scout, for example, is ridiculed in “To Kill a Mockingbird” because she is a tomboy. Boo Radley is ostracized despite the fact that hardly anyone knows him. Reverse racism is also present in the novel, as evidenced by the threats against Atticus Finch and his family as he defends Tom Robinson.In current day America we still see these injustice’s but at a lower cases. We sill see African American who have no evidence against them still get charged and prosecuted because they are black.…

    • 779 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    When opening a business it is never easy but what is going to make it harder is working with someone who is not familiar with the different information systems out there and how they will benefit our business and how some will even have certain drawbacks of our business. So what I have done here today is written up a proposal of the different information systems to kind of help him better understand why they will help our business even give him the drawbacks just so he has a better understanding of the information systems. So for running our business the information systems that I picked that would help us the most are :…

    • 450 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Management control system can be defined as a critical function in organizations. (K. A Merchant & Wim A. Van Der Stede, 2007). In other words, it can also be described as the process by which an organization secures to achieve its performance.…

    • 1585 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Conveyor Belt

    • 7352 Words
    • 30 Pages

    Scientific automation includes integration of additional functions in the software PLC. In addition to sequential control, motion control and control technology, the software PLC also includes measurement technology and other components…

    • 7352 Words
    • 30 Pages
    Powerful Essays