The importance of Security in SCADA Supervisory Control and Data Acquisition Systems

Home > Blogs > CompTIA > The importance of Security in SCADA Supervisory Control and Data Acquisition Systems

The importance of Security in SCADA Supervisory Control and Data Acquisition Systems

Like This Blog 0 Steve Fullmer
Added by April 3, 2019

This post if from our CompTIA Security + Video Certification Course, start training today!

Supervisory Control and Data Acquisition (SCADA) has become one of the largest concerns for global Security Officers particular as we automate more populous solutions.

Embedded systems are one area that probably unique to most Security Administrators or Officers that you will need to know for the CompTIA Security + certification exam.

The first of the embedded systems that you need to be familiar with is called Supervisory Control and Data Acquisition (SCADA).

The typical SCADA model is five layers where we have a computer that manages layers of other components. You don’t need to know the five layers for the Security + exam.

Supervisory Control and Data Acquisition Levels

Level  4 – Production Scheduling

Level 3 – Production Monitoring and Control

Level 2 – Supervisory Computers

Level 1 – Industrial I/O Devices

Level 0 – Sensors, Control Valves, etc…

The most-important part to pay attention to is sensors and control valves. These are low-level entries that have some sort of computer processing elements within them. The may not be processors but just controllers such as microcontrollers that maybe on a large motherboard.

Next we have Industrialized I/O Devices to which they connect. And then we move up to the Supervisory Computers and others that connect….

The big deal is with SCADA from a security perspective is the Level 1 systems are typically programmable logic controllers that are given filtering. These could be supporting something like power, oil, water and pipeline distributions etc.,.. In some large cities, SCADA controls the traffic signals for automobiles and pedestrians.

SCADA Concerns:

  • Level 1 – Programmable Logic Controllers, Remote Terminal Units
  • Level 2 – Customized OS and Software
    • Power, oil, gas pipelines, water distribution and wastewater collection systems.
      • Easily deployed and repair
      • Not easily secured
    • Remote Systems access
    • Customized software, updates and controls

Hackers, particularly terrorists and hacktivists would really love to take over a SCADA system because they could shut down entire water systems, oil pipelines etc…

The challenge behind a SCADA system is they’re easily deployed and repaired by simply replacing components. Because of the layered effect, you could create a cascade problem to occur particularly if you can take over a higher element of the system.

Therefore Level 1 and Level 2 are harder to support because they are customized operating systems and software. When we explore controls and hardening systems you want to make sure you have the latest patches, firmware if it’s hardware elements within the chipset. This can be difficult to deploy if you have a broadly distributed SCADA system with little components scattered across a city or a large geographic region.

Because of the customized software, the updates and the controls necessary to maintain it SCADA has become one of the largest concerns for global Security Officers particular as we automate more populous effecting solutions.

I look forward to seeing you in the classroom or online!

Steven Fullmer
Interface Technical Training Staff Instructor

Steve’s Video Certification Training Classes at Interface Technical Training:

CompTIA Security + Video Certification Course

Project Management Professional (PMP®) Certification Video Training PMBOK® 6th Edition

PMI-PBA Business Analysis for IT Analysts and Project Managers (PMI-PBA)® Certification

Videos You May Like

Agile Methodology in Project Management

0 117 0

In this video, you will gain an understanding of Agile and Scrum Master Certification terminologies and concepts to help you make better decisions in your Project Management capabilities. Whether you’re a developer looking to obtain an Agile or Scrum Master Certification, or you’re a Project Manager/Product Owner who is attempting to get your product or … Continue reading Agile Methodology in Project Management

Creating Users and Managing Passwords in Microsoft Office 365

0 506 3

In this Office 365 training video, instructor Spike Xavier demonstrates how to create users and manage passwords in Office 365.

Detailed Forensic Investigation of Malware Infections – April 21, 2015

4 485 3

In this IT Security training video, Security expert Mike Danseglio (CISSP / CEH) will perform several malware investigations including rootkits, botnets, viruses, and browser toolbars.

Write a Comment

Share your thoughts...

Please fill out the comment form below to post a reply.