Section 15.143 ICS and SCADA Flashcards
Objective 3.1 Compare and contrast security implications of different architecture models. Objectives 4.1 Given a scenario, apply common security techniques to computing resources
Industrial Control Systems (ICS)
Systems used to monitor and control industrial processes, found in various industries like electrical, water, oil, gas, and data
Examples of ICS systems
Distributed Control Systems (DCS)
Used in control production systems within a single location
Example of ICS systems
Programmable Logic Controllers (PLCs)
Used to control specific processes such as assembly lines and factories
Supervisory Control and Data Acquisition (SCADA) Systems
Type of ICS designed for monitoring and controlling geographically dispersed
industrial processes
Common in industries like…
Electric power generation, transmission, and distribution systems
Water treatment and distribution systems
Oil and gas pipeline monitoring and control systems
Supervisory Control and Data Acquisition (SCADA) Systems Risks
Unauthorised Access
Unauthorised individuals can manipulate system operations without proper protection
Supervisory Control and Data Acquisition (SCADA) Systems Risks
Malware Attacks
Vulnerable to disruptive malware attacks
Supervisory Control and Data Acquisition (SCADA) Systems Risks
Lack of Updates
Running outdated software with unpatched vulnerabilities
Supervisory Control and Data Acquisition (SCADA) Systems Risks
Physical Threats
Susceptible to damage to hardware or infrastructure
Securing ICS and SCADA Systems
Implement Strong Access Controls
● Strong passwords
● Two-factor authentication
● Limited access to authorized personnel only
Securing ICS and SCADA Systems
Regularly Update and Patch Systems
Keep systems updated to protect against known vulnerabilities
Securing ICS and SCADA Systems
Use Firewall and Intrusion Detection Systems
Detect and prevent unauthorised access
Securing ICS and SCADA Systems
Conduct Regular Security Audits
Identify and address potential vulnerabilities through routine
assessments
Securing ICS and SCADA Systems
Employee Training
Train employees on security awareness and response to potential threats