SlideShare a Scribd company logo
1 of 2
Download to read offline
SCADA forensic tools open source. What are they? What they do?
Solution
SCADA stands for Supervisory Control and Data Acquisition.
This technology is used to mainly ensure the operations and functionality of the control systems
used in many industries.
It is a software application program which is used to gathering of the data in real time from
remote locations so as to control the equipment and conditions in such device environments.
SCADA is mainly used in Transportation, Telecommunications, power plants, Gas refining
industries and as well in water and waste control by government agencies too.
they include software and hardware components, which gather and inputs the data into a
computer machine and processes it.
It also records all the log events into a file and stores in the local hardisk/server.
These SCADA Systems/applications also warn when conditions become hazardous by sounding
alarams.
As these systems are operated in huge network environments there is a very high possibility of
attacks.
In recent years there has been an increasing number of attacks directly targeting these systems
including the well published networks.
Therefore , there is a need to have forensic analysis of these systems to determine, if breah has
occured and the extent to which the system is compromised and also the details of how the
functional operations and assets are affected.
Apart from normal threats there are many cyber threats against SCADA systmes with
sophisticated malware attacks, SQL Injection, cross-site scripting, and the buffer overflow
attacks being the most common type of vulnerability.
Digital forensic is an important part of an incident response strategy in an IT forensic
investigation following an incident and will provide an effective response in a forensic manner.
Investigative Steps:
1 Examination: Deals with the identitfy of potential sources of evidence, including the systems,
the network and connected devices.
2 Identification: identify the types of systems to be investigated, which includes OS, serail
numbers and model types of the PLC's, the network design and the implementation.
3 Collection: Collect the potential evidence from the memory systems that are suspected to be
part of the SCADA system which is being investigated.
4 Documentation: It is very critcial to keep accurate documentation of the investigation to ensure
chain of custody. Records need to be kept of the evidence.
The existing tools for SCADA Systems are:

More Related Content

Similar to SCADA forensic tools open source. What are they What they doSo.pdf

SCADA Networks is a supervisory control data acquisition network con.pdf
SCADA Networks is a supervisory control data acquisition network con.pdfSCADA Networks is a supervisory control data acquisition network con.pdf
SCADA Networks is a supervisory control data acquisition network con.pdf
info382133
 
David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016
David Blanco
 

Similar to SCADA forensic tools open source. What are they What they doSo.pdf (20)

SCADA Networks is a supervisory control data acquisition network con.pdf
SCADA Networks is a supervisory control data acquisition network con.pdfSCADA Networks is a supervisory control data acquisition network con.pdf
SCADA Networks is a supervisory control data acquisition network con.pdf
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilities
 
Scada pdf
Scada pdfScada pdf
Scada pdf
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18
 
Security Issues in SCADA based Industrial Control Systems
Security Issues in SCADA based Industrial Control Systems Security Issues in SCADA based Industrial Control Systems
Security Issues in SCADA based Industrial Control Systems
 
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSUNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
 
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSUNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
 
Scada slide
Scada slideScada slide
Scada slide
 
Light sec for utilities and critical infrastructure white paper
Light sec for utilities and critical infrastructure white paperLight sec for utilities and critical infrastructure white paper
Light sec for utilities and critical infrastructure white paper
 
David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016
 
3778975074 january march 2015 1
3778975074 january march 2015 13778975074 january march 2015 1
3778975074 january march 2015 1
 
endpoint-detection-and-response-datasheet.pdf
endpoint-detection-and-response-datasheet.pdfendpoint-detection-and-response-datasheet.pdf
endpoint-detection-and-response-datasheet.pdf
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cyber-Defensive Architecture for Networked Industrial Control Systems
Cyber-Defensive Architecture for Networked Industrial Control SystemsCyber-Defensive Architecture for Networked Industrial Control Systems
Cyber-Defensive Architecture for Networked Industrial Control Systems
 
supply chain management.pptx
supply chain management.pptxsupply chain management.pptx
supply chain management.pptx
 
Robust Cyber Security for Power Utilities
Robust Cyber Security for Power UtilitiesRobust Cyber Security for Power Utilities
Robust Cyber Security for Power Utilities
 
Cryptography and system security
Cryptography and system securityCryptography and system security
Cryptography and system security
 
Operational Technology Security Solution for Utilities
Operational Technology Security Solution for UtilitiesOperational Technology Security Solution for Utilities
Operational Technology Security Solution for Utilities
 
Whitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceWhitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security Intelligence
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi Security
 

More from ebrahimbadushata00

irktors (lcloding his accoueting instructor thmivenity c. All student.pdf
irktors (lcloding his accoueting instructor thmivenity c. All student.pdfirktors (lcloding his accoueting instructor thmivenity c. All student.pdf
irktors (lcloding his accoueting instructor thmivenity c. All student.pdf
ebrahimbadushata00
 
IntroductionFor this program, you will implement an interface that.pdf
IntroductionFor this program, you will implement an interface that.pdfIntroductionFor this program, you will implement an interface that.pdf
IntroductionFor this program, you will implement an interface that.pdf
ebrahimbadushata00
 
Ignore what I have written because Im pretty sure its wrong. Thank.pdf
Ignore what I have written because Im pretty sure its wrong. Thank.pdfIgnore what I have written because Im pretty sure its wrong. Thank.pdf
Ignore what I have written because Im pretty sure its wrong. Thank.pdf
ebrahimbadushata00
 
Global Economy, National Economies, and CompetitionIn the first pa.pdf
Global Economy, National Economies, and CompetitionIn the first pa.pdfGlobal Economy, National Economies, and CompetitionIn the first pa.pdf
Global Economy, National Economies, and CompetitionIn the first pa.pdf
ebrahimbadushata00
 
Conclusion Phases of Oxidative Phosphorylation Focus your attention.pdf
Conclusion Phases of Oxidative Phosphorylation  Focus your attention.pdfConclusion Phases of Oxidative Phosphorylation  Focus your attention.pdf
Conclusion Phases of Oxidative Phosphorylation Focus your attention.pdf
ebrahimbadushata00
 
Computer Forensics Process Please respond to the followingThe.pdf
Computer Forensics Process Please respond to the followingThe.pdfComputer Forensics Process Please respond to the followingThe.pdf
Computer Forensics Process Please respond to the followingThe.pdf
ebrahimbadushata00
 
ArticleHinduism and Caste Systemby Jayaram VHinduism is a univ.pdf
ArticleHinduism and Caste Systemby Jayaram VHinduism is a univ.pdfArticleHinduism and Caste Systemby Jayaram VHinduism is a univ.pdf
ArticleHinduism and Caste Systemby Jayaram VHinduism is a univ.pdf
ebrahimbadushata00
 
Background Sometimes the standard C libraries (stdio.h, stdlib.h, e.pdf
Background Sometimes the standard C libraries (stdio.h, stdlib.h, e.pdfBackground Sometimes the standard C libraries (stdio.h, stdlib.h, e.pdf
Background Sometimes the standard C libraries (stdio.h, stdlib.h, e.pdf
ebrahimbadushata00
 
a. Modify the C program ex.9 so that it simulates the Unix pipe comm.pdf
a. Modify the C program ex.9 so that it simulates the Unix pipe comm.pdfa. Modify the C program ex.9 so that it simulates the Unix pipe comm.pdf
a. Modify the C program ex.9 so that it simulates the Unix pipe comm.pdf
ebrahimbadushata00
 

More from ebrahimbadushata00 (20)

irktors (lcloding his accoueting instructor thmivenity c. All student.pdf
irktors (lcloding his accoueting instructor thmivenity c. All student.pdfirktors (lcloding his accoueting instructor thmivenity c. All student.pdf
irktors (lcloding his accoueting instructor thmivenity c. All student.pdf
 
Is there a solution manual to group dynamics for team (fourth Editio.pdf
Is there a solution manual to group dynamics for team (fourth Editio.pdfIs there a solution manual to group dynamics for team (fourth Editio.pdf
Is there a solution manual to group dynamics for team (fourth Editio.pdf
 
IntroductionFor this program, you will implement an interface that.pdf
IntroductionFor this program, you will implement an interface that.pdfIntroductionFor this program, you will implement an interface that.pdf
IntroductionFor this program, you will implement an interface that.pdf
 
In Python,Create a program that asks the user for a number and the.pdf
In Python,Create a program that asks the user for a number and the.pdfIn Python,Create a program that asks the user for a number and the.pdf
In Python,Create a program that asks the user for a number and the.pdf
 
In contrast to sexual reproduction in animals, sexually-reproducing .pdf
In contrast to sexual reproduction in animals, sexually-reproducing .pdfIn contrast to sexual reproduction in animals, sexually-reproducing .pdf
In contrast to sexual reproduction in animals, sexually-reproducing .pdf
 
Ignore what I have written because Im pretty sure its wrong. Thank.pdf
Ignore what I have written because Im pretty sure its wrong. Thank.pdfIgnore what I have written because Im pretty sure its wrong. Thank.pdf
Ignore what I have written because Im pretty sure its wrong. Thank.pdf
 
How can crisis leadership be learnedSolutionAn organization n.pdf
How can crisis leadership be learnedSolutionAn organization n.pdfHow can crisis leadership be learnedSolutionAn organization n.pdf
How can crisis leadership be learnedSolutionAn organization n.pdf
 
Given the following information on a project develop early and la.pdf
Given the following information on a project develop early and la.pdfGiven the following information on a project develop early and la.pdf
Given the following information on a project develop early and la.pdf
 
Global Economy, National Economies, and CompetitionIn the first pa.pdf
Global Economy, National Economies, and CompetitionIn the first pa.pdfGlobal Economy, National Economies, and CompetitionIn the first pa.pdf
Global Economy, National Economies, and CompetitionIn the first pa.pdf
 
Explain why owners equity includes common stock as a liability eve.pdf
Explain why owners equity includes common stock as a liability eve.pdfExplain why owners equity includes common stock as a liability eve.pdf
Explain why owners equity includes common stock as a liability eve.pdf
 
Evaluate the statements below and determine which is the best reason.pdf
Evaluate the statements below and determine which is the best reason.pdfEvaluate the statements below and determine which is the best reason.pdf
Evaluate the statements below and determine which is the best reason.pdf
 
Discuss the Economic Benefits from Immigration.SolutionImmigra.pdf
Discuss the Economic Benefits from Immigration.SolutionImmigra.pdfDiscuss the Economic Benefits from Immigration.SolutionImmigra.pdf
Discuss the Economic Benefits from Immigration.SolutionImmigra.pdf
 
Conclusion Phases of Oxidative Phosphorylation Focus your attention.pdf
Conclusion Phases of Oxidative Phosphorylation  Focus your attention.pdfConclusion Phases of Oxidative Phosphorylation  Focus your attention.pdf
Conclusion Phases of Oxidative Phosphorylation Focus your attention.pdf
 
Computer Forensics Process Please respond to the followingThe.pdf
Computer Forensics Process Please respond to the followingThe.pdfComputer Forensics Process Please respond to the followingThe.pdf
Computer Forensics Process Please respond to the followingThe.pdf
 
ArticleHinduism and Caste Systemby Jayaram VHinduism is a univ.pdf
ArticleHinduism and Caste Systemby Jayaram VHinduism is a univ.pdfArticleHinduism and Caste Systemby Jayaram VHinduism is a univ.pdf
ArticleHinduism and Caste Systemby Jayaram VHinduism is a univ.pdf
 
Can someone solveexplain this I thought I was understanding this, .pdf
Can someone solveexplain this I thought I was understanding this, .pdfCan someone solveexplain this I thought I was understanding this, .pdf
Can someone solveexplain this I thought I was understanding this, .pdf
 
C The ame compound componda with F Souls . E Difluut eoupou ds with.pdf
C The ame compound componda with F Souls . E  Difluut eoupou ds with.pdfC The ame compound componda with F Souls . E  Difluut eoupou ds with.pdf
C The ame compound componda with F Souls . E Difluut eoupou ds with.pdf
 
Background Sometimes the standard C libraries (stdio.h, stdlib.h, e.pdf
Background Sometimes the standard C libraries (stdio.h, stdlib.h, e.pdfBackground Sometimes the standard C libraries (stdio.h, stdlib.h, e.pdf
Background Sometimes the standard C libraries (stdio.h, stdlib.h, e.pdf
 
a. Modify the C program ex.9 so that it simulates the Unix pipe comm.pdf
a. Modify the C program ex.9 so that it simulates the Unix pipe comm.pdfa. Modify the C program ex.9 so that it simulates the Unix pipe comm.pdf
a. Modify the C program ex.9 so that it simulates the Unix pipe comm.pdf
 
A severe B12 deficiency can cause megaloblastic anemia but in severe .pdf
A severe B12 deficiency can cause megaloblastic anemia but in severe .pdfA severe B12 deficiency can cause megaloblastic anemia but in severe .pdf
A severe B12 deficiency can cause megaloblastic anemia but in severe .pdf
 

Recently uploaded

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Krashi Coaching
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
fonyou31
 

Recently uploaded (20)

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 

SCADA forensic tools open source. What are they What they doSo.pdf

  • 1. SCADA forensic tools open source. What are they? What they do? Solution SCADA stands for Supervisory Control and Data Acquisition. This technology is used to mainly ensure the operations and functionality of the control systems used in many industries. It is a software application program which is used to gathering of the data in real time from remote locations so as to control the equipment and conditions in such device environments. SCADA is mainly used in Transportation, Telecommunications, power plants, Gas refining industries and as well in water and waste control by government agencies too. they include software and hardware components, which gather and inputs the data into a computer machine and processes it. It also records all the log events into a file and stores in the local hardisk/server. These SCADA Systems/applications also warn when conditions become hazardous by sounding alarams. As these systems are operated in huge network environments there is a very high possibility of attacks. In recent years there has been an increasing number of attacks directly targeting these systems including the well published networks. Therefore , there is a need to have forensic analysis of these systems to determine, if breah has occured and the extent to which the system is compromised and also the details of how the functional operations and assets are affected. Apart from normal threats there are many cyber threats against SCADA systmes with sophisticated malware attacks, SQL Injection, cross-site scripting, and the buffer overflow attacks being the most common type of vulnerability. Digital forensic is an important part of an incident response strategy in an IT forensic investigation following an incident and will provide an effective response in a forensic manner. Investigative Steps: 1 Examination: Deals with the identitfy of potential sources of evidence, including the systems, the network and connected devices. 2 Identification: identify the types of systems to be investigated, which includes OS, serail numbers and model types of the PLC's, the network design and the implementation. 3 Collection: Collect the potential evidence from the memory systems that are suspected to be part of the SCADA system which is being investigated.
  • 2. 4 Documentation: It is very critcial to keep accurate documentation of the investigation to ensure chain of custody. Records need to be kept of the evidence. The existing tools for SCADA Systems are: