1. Restricting
Authenticating
Tracking
User Access?
Time Is Not
On Our Side!
Page 1 of 2
12100 Sunrise Valley Dr. Suite 290-1 Reston, VA 20191
Supervisory Control And Data Acquisition (SCADA) networks
pervade the industry. These small microcontroller systems are used to
control large industrial machines and systems. SCADA systems are
predominantly used for monitoring industrial systems, often in remote
locations.
Typically remote terminal units and Programmable Logic Controllers are
connected to enterprise networks using a “telemetry” network. Where
the telemetry network meets the enterprise computer network, gateways
permit two-way communications between the SCADA network and the
traditional corporate network.
SCADA systems were designed to be highly efficient, but they were not
necessarily designed with security in mind. Because security was not the
primary consideration, SCADA telemetry networks may be highly
vulnerable to exploitation. Because SCADA systems control and provide
feedback on industrial processes, exploitation of these systems could
seriously disrupt key industrial processes, such as power generation, lift
and crane systems, and transportation systems.
There are numerous entry points to SCADA telemetry networks:
• Compromise of WLAN and/or wireless networks that connect
SCADA systems to each other and to control systems
• Compromise of gateways from traditional computer networks to the
SCADA network
• Improper physical access to key control systems
• Access to telemetry networks and modification of command-level
traffic (typically this traffic is unencrypted)
• Application-level vulnerabilities in SCADA control software
• SCADA traffic encapsulated in TCP/IP and transmitted over public
networks
SCADA exposure will short-circuit US utilities!
What is it? Where are the vulnerabilities? • What should be considered?
SCADA systems
were designed to
be highly efficient,
but they were not
necessarily designed
with security in mind.