Paper Title

A review on Modern SCADA Systems and Security Consideration of Individual SCADA system`s components.

Authors

  • Neel H. Pathak
  • Prof. Hasmukh Patel

Keywords

Modern SCADA Systems, SCADA, SCADA Security, C-I-A triad, Cyber-attacks, Component security

Abstract

Supervisory Control and Data Acquisition (SCADA) systems, a part of Industrial Control Systems (ICS) are widely used for automation and control in many industry sectors like chemical plants, electric power grids, oil and gas plants etc. Traditionally these (i.e. SCADA) systems were operated in standalone manner, typically housed within the industries, chemical plants and other such electrical and mechanical industries. However, due to the expansion of business and the need to centrally monitor and control these systems, they are now being connected to a completely alien world, the world of Internet. As these systems are now being interweaved forming a small network similar to LAN and connected to the internet, they are prone to plethora of attacks prevailing not only on internet but also within the SCADA network. One can imagine the consequences if these critical systems are tempered or illegally taken control off. We must know that when SCADA systems are compromised then the loss would not just be financial and/or business function but also THE LOSS OF LIFE. In this paper, we first discuss about the modern SCADA systems, how they operate along with its problem description, how they are different from other Business/I.T. systems and/or networks. We also explain the famous CIA triad of Information Security from SCADA system`s perspective. Finally, we will shed light on the security of individual components operating within SCADA network by, categorizing components as physical and logical.

Article Type

Published

How To Cite

Neel H. Pathak, Prof. Hasmukh Patel. "A review on Modern SCADA Systems and Security Consideration of Individual SCADA system`s components.".INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH ISSN:2321-9939, Vol.2, Issue 2, pp.1693-1699, URL :https://rjwave.org/ijedr/papers/IJEDR1402068.pdf

Issue

Volume 2 Issue 2 

Pages. 1693-1699

Article Preview