Medusa

List Of Threats To SCADA

List Of Threats To SCADA

<p style&equals;"text-align&colon; justify&semi;">SCADA or Supervisory control and data acquisition is much more than just basic well-keeping&period; These systems control critical components of <a href&equals;"https&colon;&sol;&sol;applied-risk&period;com&sol;solutions&sol;services&sol;industrial-automation-and-control-systems-iacs-security" target&equals;"&lowbar;blank" rel&equals;"noopener noreferrer"><em><strong>industrial automation networks<&sol;strong><&sol;em><&sol;a> and if they go haywire&comma; can create problems for the entire parts associated with it&period; From directly interacting with the gears&comma; valves in real time to monitoring and gathering data&comma; SCADA systems require proper keeping and safety&comma; because any defect can disrupt services for hundreds of people&period; SCADA systems are fast and reliable and come in handy for quality inspection and other services in the industry&period; The extent at which Supervisory control and data acquisition has impacted us can be felt that it serves as a backbone for major industries&comma; from Energy to Power and Oil to Water &amp&semi; waste transportation&period;<&sol;p>&NewLine;<p style&equals;"text-align&colon; justify&semi;">Now that a system this strong exists to control entire industries&comma; it is quite natural that major threats can unsettle it&period; SCADA system well keeping is not exactly an easy job to do because of the high level <a href&equals;"https&colon;&sol;&sol;applied-risk&period;com&sol;solutions&sol;services&sol;risk-and-vulnerability-assessment-rva" target&equals;"&lowbar;blank" rel&equals;"noopener noreferrer"><em><strong>risk the systems<&sol;strong><&sol;em><&sol;a> tend to face&period;<&sol;p>&NewLine;<p style&equals;"text-align&colon; justify&semi;">Few years ago in Ohio&comma; a nuclear power plant was taken off guard when a worm in the SCADA system kept it infected for over 5 hours&comma; posing major threat to the residents&period; A lot of Symantec Intelligence agencies have published in detail how hackers can rig into a SCADA system and how vulnerable most of these systems are&period; Apart from these the most common SCADA security threats are –<&sol;p>&NewLine;<p style&equals;"text-align&colon; justify&semi;"><strong>1&period; Slow Updating of SCADA –<&sol;strong> These systems tend to update very soon because of new threat discoveries&period; If one cannot keep up to the pace of the updates&comma; the entire industry faces threat of hacking&comma; that can jeopardize entire mechanisms&period;<&sol;p>&NewLine;<p style&equals;"text-align&colon; justify&semi;"><strong>2&period; Lack of proper monitoring for SCADA –<&sol;strong> After knowing what it truly is&comma; we are sure you know how important it is to be monitored and kept well&period; But the major problem here is that it is impossible to track any malicious activity until it actually happens&period;<&sol;p>&NewLine;<p style&equals;"text-align&colon; justify&semi;"><strong>3&period; Lack of proper pairing of SCADA systems &&num;8211&semi;<&sol;strong> Linking devices to a SCADA System allows for far-flung monitoring and updates&comma; but not all devices have equal reporting capabilities&period; Most SCADA systems have been developed gradually over time&semi; it’s not scarce to see technology that’s 5 years old paired with technology that’s 15 years old&period;<&sol;p>&NewLine;<p style&equals;"text-align&colon; justify&semi;"><strong>4&period; Lack of knowledge of Traffic in SCADA systems –<&sol;strong> SCADA systems’ manager need to have proper knowledge of understanding the traffic on networks and how they operate&period; For example&comma; a subverted system might check with a extraneous server once every 30&comma; 45&comma; or 180 days&period;<&sol;p>&NewLine;<p style&equals;"text-align&colon; justify&semi;"><strong>5&period; Holes in authentication programs –<&sol;strong> There are high chances that there may be authentication holes in the Supervisory control and data acquisition systems that can disrupt the overall system&period; Though <em><strong>SCADA penetration testing<&sol;strong><&sol;em> can reveal any such problems&comma; working without them is risky&period;<&sol;p>&NewLine;

Exit mobile version