A review on Modern SCADA Systems and Security Consideration of Individual SCADA system`s components.
Neel H. Pathak,  Prof. Hasmukh Patel
Supervisory Control and Data Acquisition (SCADA) systems, a part of Industrial Control Systems (ICS) are
widely used for automation and control in many industry sectors like chemical plants, electric power grids, oil and gas
plants etc. Traditionally these (i.e. SCADA) systems were operated in standalone manner, typically housed within the
industries, chemical plants and other such electrical and mechanical industries. However, due to the expansion of business
and the need to centrally monitor and control these systems, they are now being connected to a completely alien world, the
world of Internet. As these systems are now being interweaved forming a small network similar to LAN and connected to
the internet, they are prone to plethora of attacks prevailing not only on internet but also within the SCADA network.
One can imagine the consequences if these critical systems are tempered or illegally taken control off. We must know that
when SCADA systems are compromised then the loss would not just be financial and/or business function but also THE
LOSS OF LIFE. In this paper, we first discuss about the modern SCADA systems, how they operate along with its
problem description, how they are different from other Business/I.T. systems and/or networks. We also explain the
famous CIA triad of Information Security from SCADA system`s perspective. Finally, we will shed light on the security of
individual components operating within SCADA network by, categorizing components as physical and logical.
Keywords- Modern SCADA Systems, SCADA, SCADA Security, C-I-A triad, Cyber-attacks, Component security
Cite this Article
Neel H. Pathak,  Prof. Hasmukh Patel,   "A review on Modern SCADA Systems and Security Consideration of Individual SCADA system`s components."
, International Journal of Engineering Development and Research (IJEDR), ISSN:2321-9939, Volume.2, Issue 2, pp.1693-1699, June 2014, Available at :http://www.ijedr.org/papers/IJEDR1402068.pdf