SlideShare a Scribd company logo
SCADA forensic tools open source. What are they? What they do?
Solution
SCADA stands for Supervisory Control and Data Acquisition.
This technology is used to mainly ensure the operations and functionality of the control systems
used in many industries.
It is a software application program which is used to gathering of the data in real time from
remote locations so as to control the equipment and conditions in such device environments.
SCADA is mainly used in Transportation, Telecommunications, power plants, Gas refining
industries and as well in water and waste control by government agencies too.
they include software and hardware components, which gather and inputs the data into a
computer machine and processes it.
It also records all the log events into a file and stores in the local hardisk/server.
These SCADA Systems/applications also warn when conditions become hazardous by sounding
alarams.
As these systems are operated in huge network environments there is a very high possibility of
attacks.
In recent years there has been an increasing number of attacks directly targeting these systems
including the well published networks.
Therefore , there is a need to have forensic analysis of these systems to determine, if breah has
occured and the extent to which the system is compromised and also the details of how the
functional operations and assets are affected.
Apart from normal threats there are many cyber threats against SCADA systmes with
sophisticated malware attacks, SQL Injection, cross-site scripting, and the buffer overflow
attacks being the most common type of vulnerability.
Digital forensic is an important part of an incident response strategy in an IT forensic
investigation following an incident and will provide an effective response in a forensic manner.
Investigative Steps:
1 Examination: Deals with the identitfy of potential sources of evidence, including the systems,
the network and connected devices.
2 Identification: identify the types of systems to be investigated, which includes OS, serail
numbers and model types of the PLC's, the network design and the implementation.
3 Collection: Collect the potential evidence from the memory systems that are suspected to be
part of the SCADA system which is being investigated.
4 Documentation: It is very critcial to keep accurate documentation of the investigation to ensure
chain of custody. Records need to be kept of the evidence.
The existing tools for SCADA Systems are:

More Related Content

PDF
SCADA Systems Vulnerabilities and Blockchain Technology
PDF
Encryption Security in SCADA Networks
PDF
Utilization of Encryption for Security in SCADA Networks
PDF
IJSRED-V2I2P15
PPTX
Training manual on scada
PDF
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
PDF
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
PPTX
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...
SCADA Systems Vulnerabilities and Blockchain Technology
Encryption Security in SCADA Networks
Utilization of Encryption for Security in SCADA Networks
IJSRED-V2I2P15
Training manual on scada
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...

Similar to SCADA forensic tools open source. What are they What they doSo.pdf (20)

PDF
SCADA Networks is a supervisory control data acquisition network con.pdf
PDF
Standards based security for energy utilities
PDF
Scada pdf
PPTX
Nozomi Fortinet Accelerate18
PPTX
Security Issues in SCADA based Industrial Control Systems
PDF
An In-Depth Introduction to SCADA Systems
PDF
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
PDF
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
PDF
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
PPTX
Scada slide
PDF
Light sec for utilities and critical infrastructure white paper
PDF
David Blanco ISHM 8280-2016
PDF
3778975074 january march 2015 1
PDF
endpoint-detection-and-response-datasheet.pdf
DOCX
mangement MEASURE OF CYBER SECURITY MANAGMNET
ODP
Cloud Computing
PDF
Cyber-Defensive Architecture for Networked Industrial Control Systems
PPTX
supply chain management.pptx
PDF
Robust Cyber Security for Power Utilities
PPTX
Cryptography and system security
SCADA Networks is a supervisory control data acquisition network con.pdf
Standards based security for energy utilities
Scada pdf
Nozomi Fortinet Accelerate18
Security Issues in SCADA based Industrial Control Systems
An In-Depth Introduction to SCADA Systems
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
Scada slide
Light sec for utilities and critical infrastructure white paper
David Blanco ISHM 8280-2016
3778975074 january march 2015 1
endpoint-detection-and-response-datasheet.pdf
mangement MEASURE OF CYBER SECURITY MANAGMNET
Cloud Computing
Cyber-Defensive Architecture for Networked Industrial Control Systems
supply chain management.pptx
Robust Cyber Security for Power Utilities
Cryptography and system security
Ad

More from ebrahimbadushata00 (20)

PDF
irktors (lcloding his accoueting instructor thmivenity c. All student.pdf
PDF
Is there a solution manual to group dynamics for team (fourth Editio.pdf
PDF
IntroductionFor this program, you will implement an interface that.pdf
PDF
In Python,Create a program that asks the user for a number and the.pdf
PDF
In contrast to sexual reproduction in animals, sexually-reproducing .pdf
PDF
Ignore what I have written because Im pretty sure its wrong. Thank.pdf
PDF
How can crisis leadership be learnedSolutionAn organization n.pdf
PDF
Given the following information on a project develop early and la.pdf
PDF
Global Economy, National Economies, and CompetitionIn the first pa.pdf
PDF
Explain why owners equity includes common stock as a liability eve.pdf
PDF
Evaluate the statements below and determine which is the best reason.pdf
PDF
Discuss the Economic Benefits from Immigration.SolutionImmigra.pdf
PDF
Conclusion Phases of Oxidative Phosphorylation Focus your attention.pdf
PDF
Computer Forensics Process Please respond to the followingThe.pdf
PDF
ArticleHinduism and Caste Systemby Jayaram VHinduism is a univ.pdf
PDF
Can someone solveexplain this I thought I was understanding this, .pdf
PDF
C The ame compound componda with F Souls . E Difluut eoupou ds with.pdf
PDF
Background Sometimes the standard C libraries (stdio.h, stdlib.h, e.pdf
PDF
a. Modify the C program ex.9 so that it simulates the Unix pipe comm.pdf
PDF
A severe B12 deficiency can cause megaloblastic anemia but in severe .pdf
irktors (lcloding his accoueting instructor thmivenity c. All student.pdf
Is there a solution manual to group dynamics for team (fourth Editio.pdf
IntroductionFor this program, you will implement an interface that.pdf
In Python,Create a program that asks the user for a number and the.pdf
In contrast to sexual reproduction in animals, sexually-reproducing .pdf
Ignore what I have written because Im pretty sure its wrong. Thank.pdf
How can crisis leadership be learnedSolutionAn organization n.pdf
Given the following information on a project develop early and la.pdf
Global Economy, National Economies, and CompetitionIn the first pa.pdf
Explain why owners equity includes common stock as a liability eve.pdf
Evaluate the statements below and determine which is the best reason.pdf
Discuss the Economic Benefits from Immigration.SolutionImmigra.pdf
Conclusion Phases of Oxidative Phosphorylation Focus your attention.pdf
Computer Forensics Process Please respond to the followingThe.pdf
ArticleHinduism and Caste Systemby Jayaram VHinduism is a univ.pdf
Can someone solveexplain this I thought I was understanding this, .pdf
C The ame compound componda with F Souls . E Difluut eoupou ds with.pdf
Background Sometimes the standard C libraries (stdio.h, stdlib.h, e.pdf
a. Modify the C program ex.9 so that it simulates the Unix pipe comm.pdf
A severe B12 deficiency can cause megaloblastic anemia but in severe .pdf
Ad

Recently uploaded (20)

PDF
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
PDF
1_English_Language_Set_2.pdf probationary
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PPTX
Introduction to Building Materials
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PPTX
Cell Types and Its function , kingdom of life
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
PPTX
Unit 4 Skeletal System.ppt.pptxopresentatiom
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Trump Administration's workforce development strategy
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
1_English_Language_Set_2.pdf probationary
Final Presentation General Medicine 03-08-2024.pptx
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Introduction to Building Materials
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
History, Philosophy and sociology of education (1).pptx
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Cell Types and Its function , kingdom of life
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
Unit 4 Skeletal System.ppt.pptxopresentatiom
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Trump Administration's workforce development strategy
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
What if we spent less time fighting change, and more time building what’s rig...
ChatGPT for Dummies - Pam Baker Ccesa007.pdf

SCADA forensic tools open source. What are they What they doSo.pdf

  • 1. SCADA forensic tools open source. What are they? What they do? Solution SCADA stands for Supervisory Control and Data Acquisition. This technology is used to mainly ensure the operations and functionality of the control systems used in many industries. It is a software application program which is used to gathering of the data in real time from remote locations so as to control the equipment and conditions in such device environments. SCADA is mainly used in Transportation, Telecommunications, power plants, Gas refining industries and as well in water and waste control by government agencies too. they include software and hardware components, which gather and inputs the data into a computer machine and processes it. It also records all the log events into a file and stores in the local hardisk/server. These SCADA Systems/applications also warn when conditions become hazardous by sounding alarams. As these systems are operated in huge network environments there is a very high possibility of attacks. In recent years there has been an increasing number of attacks directly targeting these systems including the well published networks. Therefore , there is a need to have forensic analysis of these systems to determine, if breah has occured and the extent to which the system is compromised and also the details of how the functional operations and assets are affected. Apart from normal threats there are many cyber threats against SCADA systmes with sophisticated malware attacks, SQL Injection, cross-site scripting, and the buffer overflow attacks being the most common type of vulnerability. Digital forensic is an important part of an incident response strategy in an IT forensic investigation following an incident and will provide an effective response in a forensic manner. Investigative Steps: 1 Examination: Deals with the identitfy of potential sources of evidence, including the systems, the network and connected devices. 2 Identification: identify the types of systems to be investigated, which includes OS, serail numbers and model types of the PLC's, the network design and the implementation. 3 Collection: Collect the potential evidence from the memory systems that are suspected to be part of the SCADA system which is being investigated.
  • 2. 4 Documentation: It is very critcial to keep accurate documentation of the investigation to ensure chain of custody. Records need to be kept of the evidence. The existing tools for SCADA Systems are: