SCADA - Wikipedia
SCADA - Wikipedia
SCADA - Wikipedia
Examples of use
Supervisory computers
Programmable logic
controllers
Also known as PLCs, these are
connected to sensors and actuators in
the process, and are networked to the
supervisory system in the same way as
RTUs. PLCs have more sophisticated
embedded control capabilities than
RTUs, and are programmed in one or
more IEC 61131-3 programming
languages. PLCs are often used in place
of RTUs as field devices because they are
more economical, versatile, flexible and
configurable.
Communication infrastructure
Human-machine interface
Play media
More complex SCADA animation showing control of
four batch cookers
Alarm handling
An important part of most SCADA
implementations is alarm handling. The
system monitors whether certain alarm
conditions are satisfied, to determine
when an alarm event has occurred. Once
an alarm event has been detected, one or
more actions are taken (such as the
activation of one or more alarm
indicators, and perhaps the generation of
email or text messages so that
management or remote SCADA
operators are informed). In many cases,
a SCADA operator may have to
acknowledge the alarm event; this may
deactivate some alarm indicators,
whereas other indicators remain active
until the alarm conditions are cleared.
Alarm conditions can be explicit—for
example, an alarm point is a digital
status point that has either the value
NORMAL or ALARM that is calculated by
a formula based on the values in other
analogue and digital points—or implicit:
the SCADA system might automatically
monitor whether the value in an analogue
point lies outside high and low- limit
values associated with that point.
PLC/RTU programming
"Smart" RTUs, or standard PLCs, are
capable of autonomously executing
simple logic processes without involving
the supervisory computer. They employ
standardized control programming
languages such as under, IEC 61131-3 (a
suite of 5 programming languages
including function block, ladder,
structured text, sequence function charts
and instruction list), is frequently used to
create programs which run on these
RTUs and PLCs. Unlike a procedural
language such as the C programming
language or FORTRAN, IEC 61131-3 has
minimal training requirements by virtue
of resembling historic physical control
arrays. This allows SCADA system
engineers to perform both the design and
implementation of a program to be
executed on an RTU or PLC.
Communication
infrastructure and methods
SCADA systems have traditionally used
combinations of radio and direct wired
connections, although SONET/SDH is
also frequently used for large systems
such as railways and power stations. The
remote management or monitoring
function of a SCADA system is often
referred to as telemetry. Some users
want SCADA data to travel over their pre-
established corporate networks or to
share the network with other
applications. The legacy of the early low-
bandwidth protocols remains, though.
SCADA architecture
development
The United States Army's Training Manual 5-601
covers "SCADA Systems for C4ISR Facilities"
Second generation:
"distributed"
SCADA information and command
processing was distributed across
multiple stations which were connected
through a LAN. Information was shared
in near real time. Each station was
responsible for a particular task, which
reduced the cost as compared to First
Generation SCADA. The network
protocols used were still not
standardized. Since these protocols were
proprietary, very few people beyond the
developers knew enough to determine
how secure a SCADA installation was.
Security of the SCADA installation was
usually overlooked.
Security issues
SCADA systems that tie together
decentralized facilities such as power, oil,
gas pipelines, water distribution and
wastewater collection systems were
designed to be open, robust, and easily
operated and repaired, but not
necessarily secure.[18] The move from
proprietary technologies to more
standardized and open solutions
together with the increased number of
connections between SCADA systems,
office networks and the Internet has
made them more vulnerable to types of
network attacks that are relatively
common in computer security. For
example, United States Computer
Emergency Readiness Team (US-CERT)
released a vulnerability advisory[19]
warning that unauthenticated users
could download sensitive configuration
information including password hashes
from an Inductive Automation Ignition
system utilizing a standard attack type
leveraging access to the Tomcat
Embedded Web server. Security
researcher Jerry Brown submitted a
similar advisory regarding a buffer
overflow vulnerability[20] in a Wonderware
InBatchClient ActiveX control. Both
vendors made updates available prior to
public vulnerability release. Mitigation
recommendations were standard
patching practices and requiring VPN
access for secure connectivity.
Consequently, the security of some
SCADA-based systems has come into
question as they are seen as potentially
vulnerable to cyber attacks.[2][21][22]
In particular, security researchers are
concerned about:
See also
DNP3
IEC 60870
EPICS
References
1. Boys, Walt (18 August 2009). "Back to
Basics: SCADA" . Automation TV: Control
Global - Control Design.
2. "Cyberthreats, Vulnerabilities and
Attacks on SCADA Networks" (PDF). Rosa
Tang, berkeley.edu. Archived from the
original (PDF) on 13 August 2012.
Retrieved 1 August 2012.
3. Boyer, Stuart A. (2010). SCADA
Supervisory Control and Data Acquisition.
USA: ISA - International Society of
Automation. p. 179. ISBN 978-1-936007-
09-7.
4. Jeff Hieb (2008). Security Hardened
Remote Terminal Units for SCADA
Networks . University of Louisville.
5. Aquino-Santos, Raul (30 November
2010). Emerging Technologies in Wireless
Ad-hoc Networks: Applications and Future
Development: Applications and Future
Development . IGI Global. pp. 43–.
ISBN 978-1-60960-029-7.
6. "Introduction to Industrial Control
Networks" (PDF). IEEE Communications
Surveys and Tutorials. 2012.
7. Bergan, Christian (August 2011).
"Demystifying Satellite for the Smart Grid:
Four Common Misconceptions" . Electric
Light & Powers. Utility Automation &
Engineering T&D. Tulsa, OK: PennWell. 16
(8). Four. Retrieved 2 May 2012. “satellite
is a cost-effective and secure solution
that can provide backup communications
and easily support core smart grid
applications like SCADA, telemetry, AMI
backhaul and distribution automation”
8. OFFICE OF THE MANAGER NATIONAL
COMMUNICATIONS SYSTEMctober 2004.
"Supervisory Control and Data Acquisition
(SCADA) Systems" (PDF). NATIONAL
COMMUNICATIONS SYSTEM.
9. "SCADA Systems april 2014" .
10. J. Russel. "A Brief History of
SCADA/EMS (2015)" . Archived from the
original on 11 August 2015.
11. Security Hardened Remote Terminal
Units for SCADA Networks . ProQuest.
2008. pp. 12–. ISBN 978-0-549-54831-7.
12. "SCADA as a service approach for
interoperability of micro-grid platforms".
Sustainable Energy, Grids and Network.
2016. doi:10.1016/j.segan.2016.08.001 .
13. SCADA and the Internet of Things
Retrieved May 22, 2017
14. "SCADA as a service approach for
interoperability of micro-grid platforms",
Sustainable Energy, Grids and Network,
2016, doi:10.1016/j.segan.2016.08.001
15. How The "Internet Of Things" Is
Turning Cities Into Living Organisms
Archived 21 October 2013 at the
Wayback Machine. Retrieved September
16, 2013
16. "The History of Data Modeling" .
Exforsys Inc. 11 January 2007.
17. "CIM and OPC UA for interoperability
of micro-grid platforms" . Proceedings of
the IEEE ISGT 2016 Conference. 6
September 2016.
18. Boyes, Walt (2011). Instrumentation
Reference Book, 4th Edition. USA:
Butterworth-Heinemann. p. 27. ISBN 0-
7506-8308-2.
19. "ICSA-11-231-01—INDUCTIVE
AUTOMATION IGNITION INFORMATION
DISCLOSURE VULNERABILITY" (PDF). 19
Aug 2011. Retrieved 21 Jan 2013.
20. "ICSA-11-094-01—WONDERWARE
INBATCH CLIENT ACTIVEX BUFFER
OVERFLOW" (PDF). 13 Apr 2011.
Retrieved 26 Mar 2013.
21. D. Maynor and R. Graham (2006).
"SCADA Security and Terrorism: We're Not
Crying Wolf" (PDF).
22. Robert Lemos (26 July 2006). "SCADA
system makers pushed toward security" .
SecurityFocus. Retrieved 9 May 2007.
23. "Industrial Security Best Practices"
(PDF). Rockwell Automation. Retrieved
26 Mar 2013.
24. Slay, J.; Miller, M. (November 2007).
"Chpt 6: Lessons Learned from the
Maroochy Water Breach". Critical
infrastructure protection (Online-Ausg.
ed.). Springer Boston. pp. 73–82.
ISBN 978-0-387-75461-1. Retrieved 2 May
2012.
25.
http://www.empcommission.org/docs/A2
473-EMP_Commission-7MB.pdf
26. "Security for all" . InTech. June 2008.
Retrieved 2 May 2012.
27. "SCADA Security – Generic Electric
Grid Malware Design" . Archived from the
original on 7 January 2009.
28. KEMA, Inc. (November 2006).
"Substation Communications: Enabler of
Automation / An Assessment of
Communications Technologies". UTC –
United Telecom Council: 3–21.
29. Mills, Elinor (21 July 2010). "Details of
the first-ever control system malware
(FAQ)" . CNET. Retrieved 21 July 2010.
30. "SIMATIC WinCC / SIMATIC PCS 7:
Information concerning Malware / Virus /
Trojan" . Siemens. 21 July 2010. Retrieved
22 July 2010. “malware (trojan) which
affects the visualization system WinCC
SCADA.”
31. "Siemens: Stuxnet worm hit industrial
systems" . Archived from the original on
25 May 2012. Retrieved 16 September
2010.
32. "American Blackout" . National
Geographic Channel. Retrieved
14 October 2016.
External links
Wikimedia Commons has media
related to SCADA.
Retrieved from
"https://en.wikipedia.org/w/index.php?
title=SCADA&oldid=831161168"