Preview

Scada

Powerful Essays
Open Document
Open Document
5413 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Scada
SCADA Systems Security
Arjun Venkatraman arjun.dhanush@gmail.com

1. Abstract The purpose of this paper is to define what SCADA systems are and their application in modern industry and infrastructure, to elucidate the reasons for rising concern over the security of these systems, to analyze the fundamental vulnerabilities and to put forth recommendations for the implementation of security in these systems.

2. Introduction: Supervisory Control and Data Acquisition systems are basically Process Control Systems (PCS), specifically designed to automate systems such as traffic control, power grid management, waste processing etc.

3. Application Control systems are used at all levels of manufacturing and industrial processing. A manufacturing plant that employs robotic arms will have a control system to direct robotic arms and conveyor belts on the shop floor. It may use that same system for packaging the finished product and tracking inventory. It may also use a control system to monitor its distribution network. A chemical company will use control systems to monitor tank levels and to ensure that ingredients are mixed in the proper proportions. A Las Vegas casino will use control systems to direct the spray from water fountains in coordination with the lights and music. Control systems are also used in the drilling and refining of oil and natural gas. They are used in the distribution of water and electricity by utility companies, and in the collection of wastewater and sewage. Virtually every sector of the economy employs control systems at all levels. The term "supervisory control and data acquisition" (SCADA), however, is generally accepted to mean the systems that control the distribution of critical infrastructure public utilities (water, sewer, electricity, and oil and gas). SCADA systems are still to come into widespread infrastructural use in India. In this country they are being used primarily for automation in industrial production, and to some



References: Barton Gellman, Washington Post, June 27, 2002; Page A01 5) 5)

You May Also Find These Documents Helpful

  • Best Essays

    Aircraft Solutions Project

    • 2440 Words
    • 10 Pages

    The purpose of the report is to assist Aircraft Solutions (AS) in indentifying the most significant Information Technology (IT) security vulnerabilities. AS products and services are at the forefront of the industry and the protection of such is very important as they are an industry leader. The vulnerabilities that will be discussed are the firewall configuration, virtualization of their hardware assets and defining security policy regarding the timeliness of firewall configuration and updates.…

    • 2440 Words
    • 10 Pages
    Best Essays
  • Powerful Essays

    The primarily responsibility is monitoring and controlling the numerous alarm "input" devices (manual and automatic detection modules) and then triggering the appropriate alarm "output" devices (horns, bells, warning lights, emergency telephone dialers, and building controls) (Gagnon, 2008). Control panels often run the gambit from single input and output units, to high-tech computer systems that can monitor numerous structures that spread out over campuses depending on requirements. The two most common control panel designs are conventional and addressable. Both of which are further detailed…

    • 2396 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    Hilcrest Auto Case

    • 973 Words
    • 3 Pages

    control is especially critical in the automotive supply industry. One reason is that there are only…

    • 973 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Quiz 3 Bus 430

    • 573 Words
    • 6 Pages

    _______ involves computer control of a manufacturing process, such as determining tool movements and cutting speeds.…

    • 573 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Aircraft Solution’s Commercial Division, connects to the rest of the world via the Internet causing hardware vulnerabilities due to the absence of security and safety that should be implemented, leaving great concern for major security threats. The Commercial Division is only able to access important…

    • 745 Words
    • 3 Pages
    Good Essays
  • Good Essays

    What are the different types of control systems? What are some advantages and disadvantages of the various control mechanisms? How does your organization use the steps of the control process?…

    • 543 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Organizational Review of Plant Automation Group It is intended that this organizational review, will provide the Districts with a better understanding of the changing process computer hardware and software support needs. Also to review the department location for the Plant Automation Group (Group), and develop recommendations on the proposed reporting relationships. ¨ Review the background information. ¨ Identify the primary and secondary functions of the Plant Automation Group ¨ Review possible location of the Plant Automation Group.…

    • 1682 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    be in place that will be both reactive and proactive in reaching the aims of the…

    • 755 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    that of operational security, or “Opsec”. This takes many forms, from keeping top secret actions and information secured and out of the hands of potential enemies, all the way to checking and double-checking all security measures guarding these “sensitive items”. This paper will explain the reasonings and methods behind, specifically, the guarding, securing, and monitoring of sensitive items of various types, as well as the consequences if such actions are not taken.…

    • 767 Words
    • 4 Pages
    Good Essays
  • Better Essays

    * Software systems are available to help control CM and the database is referenced. Software packages available include a ticketing system. When a change needs to happen that could have an impact on any of the systems, it is vetted through all the owners of the various systems. It focuses around accountability. Who has done what, and who has permission to alter the configuration. Approval not given for a change until the ticket makes a round robin of every department to assure systems are not affected.…

    • 748 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    When opening a business it is never easy but what is going to make it harder is working with someone who is not familiar with the different information systems out there and how they will benefit our business and how some will even have certain drawbacks of our business. So what I have done here today is written up a proposal of the different information systems to kind of help him better understand why they will help our business even give him the drawbacks just so he has a better understanding of the information systems. So for running our business the information systems that I picked that would help us the most are :…

    • 450 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Conveyor Belt

    • 7352 Words
    • 30 Pages

    Scientific automation includes integration of additional functions in the software PLC. In addition to sequential control, motion control and control technology, the software PLC also includes measurement technology and other components…

    • 7352 Words
    • 30 Pages
    Powerful Essays
  • Powerful Essays

    Management control system can be defined as a critical function in organizations. (K. A Merchant & Wim A. Van Der Stede, 2007). In other words, it can also be described as the process by which an organization secures to achieve its performance.…

    • 1585 Words
    • 7 Pages
    Powerful Essays