SlideShare a Scribd company logo
SCADA security, 2013 Slide 1
SCADA systems security
SCADA security, 2013 Slide 2
24/7 infrastructure availability
• The infrastructure controlled by SCADA
systems and PLCs often has to be
continuously available and must operate as
expected
SCADA security, 2013 Slide 3
Continuous operation
• In some cases, it may
be very disruptive to
switch off PLC-
controlled equipment
as it is impossible to
predict when the
system will be required
SCADA security, 2013 Slide 4
Critical SCADA systems
• Failure of controlled systems can lead to
direct loss of life due to equipment failure or
indirect losses due to failure of the critical
infrastructure controlled by SCADA systems
• SCADA must therefore be dependable
– Safety and reliability
– Security
SCADA security, 2013 Slide 5
SCADA safety and reliability
• SCADA safety and reliability
– Needs specific safety analysis techniques for
PLCs because they are programmed in a
different way (ladder logic)
– SCADA systems are designed with
redundancy and backup, which contributes to
the availability of these systems
SCADA security, 2013 Slide 6
SCADA security
SCADA security, 2013 Slide 7
SCADA legacy systems
• Security through isolation
– SCADA systems, historically, were unconcerned
with security because they were isolated systems
• Security through obscurity
– Non-standard programming languages and
protocols used.
SCADA security, 2013 Slide 8
Security through isolation
• If a system is not connected to the
Internet, then it cannot be penetrated by
attacks from the Internet
• This is the so-called ‘air gap’ between the
SCADA system and the rest of the world
SCADA security, 2013 Slide 9
Maroochy Water Breach
• The Maroochy Water Breach (see video) was a
cyberattack on a sewage treatment system in
Australia carried out by an insider
SCADA security, 2013 Slide 10
Security through obscurity
• Approach to security that is based on the fact
that information about a system is not widely
known or available so the assumption is that
few people can successfully attack the
system from outside
SCADA security, 2013 Slide 11
Security through obscurity
• Susceptible to insider attack from those who
know the information inside the organization
• SCADA systems are sold globally – therefore
information is available to other countries who
may be potentially hostile
• Information on SCADA systems can be stolen
and used by attackers
SCADA security, 2013 Slide 12
SCADA connectivity
• 3rd generation SCADA systems are now
reliant on standard IT technologies and
protocols (Microsoft Windows, TCP/IP,
web browsers, organisational wireless
networks, etc.)
• Integrated with older SCADA systems
SCADA security, 2013 Slide 13
Internet-based SCADA
SCADA security, 2013 Slide 14
SCADA legacy systems
• There are a huge number of 2nd generation SCADA
systems that are still in use and are likely to remain in use
for many years
– Infrastructure systems can have a 20+ year lifetime
• However, these are now being ‘updated’ with new
equipment which is network-connected
• These older legacy systems were developed without
security awareness and so are particularly vulnerable to
attack
SCADA security, 2013 Slide 15
The myth of the ‘air gap’
• Direct connections to vendors for
maintenance, stock ordering etc.
• Connected to enterprise systems,
which in turn are on the Internet.
SCADA security, 2013 Slide 16
The myth of the air gap
• PCs used by operators may be multi-
functional and internet connected
• Operators transfer information using
USB drives
SCADA security, 2013 Slide 17
SCADA vulnerabilities
SCADA security, 2013 Slide 18
SCADA security vulnerabilities
• Weak passwords
• Open to port scanning to discover SCADA systems
on network
• Lack of input validation –buffer overflow and SQL
poisoning
• Unencrypted network traffic
SCADA security, 2013 Slide 19
SCADA security challenges
• SCADA systems and PLC software is normally
developed by engineering companies with very
limited experience of developing secure systems
• The system developers are usually domain experts
(oil and gas engineers, power engineers, etc.) rather
than software engineers.
• They may have had no training in security
techniques.
SCADA security, 2013 Slide 20
SCADA security challenges
• Not always possible to use standard security
tools and techniques:
– It may not be possible to install anti-virus
protection on process control systems,
owing to the lack of processor power on
legacy systems, the age of operating
systems or the lack of vendor certification.
SCADA security, 2013 Slide 21
SCADA security challenges
• Security testing on process control systems
must also be approached with extreme
caution – security scanning can seriously
affect the operation of many control devices.
• There are sometimes few opportunities to
take the systems off-line for routine testing,
patching and maintenance.
SCADA security, 2013 Slide 22
Improving SCADA security
• Government and industry reports to raise
awareness of SCADA security issues
• Establishment of bodies specifically concerned
with infrastructure protection who can advise on
SCADA system security
SCADA security, 2013 Slide 23
Improving SCADA security
• Better security education and training for SCADA
developers
• Need for regulators to become involved – security
certification
SCADA security, 2013 Slide 24
© David Shankbone 2012
SCADA security, 2013 Slide 25
Summary
• Government organisations are seriously concerned
about the vulnerability of SCADA systems to
cyberattacks and the consequences for our national
infrastructure
• SCADA systems connected to internet so vulnerable to
external attack
• SCADA systems are often old systems that were built
without security concerns – therefore are vulnerable to
external attack

More Related Content

PDF
SCADA Security Presentation
PDF
Securing SCADA
PDF
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
PDF
Industrial_Cyber_Security
PDF
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
PDF
The journey to ICS - Extended
PPTX
Security of IOT,OT And IT.pptx
PDF
SenseTek Stratos Micra 25 installers handbook
SCADA Security Presentation
Securing SCADA
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Industrial_Cyber_Security
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
The journey to ICS - Extended
Security of IOT,OT And IT.pptx
SenseTek Stratos Micra 25 installers handbook

What's hot (20)

PDF
Secure Systems Security and ISA99- IEC62443
PDF
Secure by Design - Security Design Principles for the Rest of Us
PDF
Access Control System, BMS
PDF
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
PPTX
Security Information Event Management - nullhyd
PPTX
CISSP Chapter 1 Risk Management
PPTX
Understanding cyber resilience
PPTX
Cyber security: A roadmap to secure solutions
PPTX
Technology Overview - Symantec Data Loss Prevention (DLP)
PPTX
Security Operation Center - Design & Build
PDF
Q radar architecture deep dive
PDF
Data Center Security
PDF
Cybersecurity in Industrial Control Systems (ICS)
PPTX
Introduction to ICS/SCADA security
PPTX
Dependability and security (CS 5032 2012)
PDF
Nozomi Networks Q1_2018 Company Introduction
PDF
Computer Security - CCNA Security - Lecture 1
PDF
What is ISO 27001 ISMS
PPTX
CyberSecurity
PDF
Cybersecurity Roadmap for Beginners
Secure Systems Security and ISA99- IEC62443
Secure by Design - Security Design Principles for the Rest of Us
Access Control System, BMS
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
Security Information Event Management - nullhyd
CISSP Chapter 1 Risk Management
Understanding cyber resilience
Cyber security: A roadmap to secure solutions
Technology Overview - Symantec Data Loss Prevention (DLP)
Security Operation Center - Design & Build
Q radar architecture deep dive
Data Center Security
Cybersecurity in Industrial Control Systems (ICS)
Introduction to ICS/SCADA security
Dependability and security (CS 5032 2012)
Nozomi Networks Q1_2018 Company Introduction
Computer Security - CCNA Security - Lecture 1
What is ISO 27001 ISMS
CyberSecurity
Cybersecurity Roadmap for Beginners
Ad

Similar to Scada security (20)

PDF
Securing SCADA
PPT
LIBRARY RESEARCH PROJECT cyber security control inSCAD.ppt
PPT
LIBRARY RESEARCH PROJECT SECURITY CONTROL IN SCADA
PDF
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
PPTX
Security Issues in SCADA based Industrial Control Systems
PPTX
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
PPTX
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
PDF
SCADA Systems Vulnerabilities and Blockchain Technology
PPTX
Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02
PPTX
Scada Industrial Control Systems Penetration Testing
PPTX
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...
PPT
Cybersecurity for Control Systems: Current State and Future Vision pt.1
PDF
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
PPTX
Scada slide
PDF
SCADA Exposure Will Short-Circuit US Utilities
PPTX
SCADA Systems and its security!
PDF
IJSRED-V2I2P15
PPTX
NTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
PPTX
Introducing scada
PDF
David Blanco ISHM 8280-2016
Securing SCADA
LIBRARY RESEARCH PROJECT cyber security control inSCAD.ppt
LIBRARY RESEARCH PROJECT SECURITY CONTROL IN SCADA
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
Security Issues in SCADA based Industrial Control Systems
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
SCADA Systems Vulnerabilities and Blockchain Technology
Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02
Scada Industrial Control Systems Penetration Testing
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...
Cybersecurity for Control Systems: Current State and Future Vision pt.1
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Scada slide
SCADA Exposure Will Short-Circuit US Utilities
SCADA Systems and its security!
IJSRED-V2I2P15
NTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
Introducing scada
David Blanco ISHM 8280-2016
Ad

More from sommerville-videos (20)

PPTX
Architectural patterns for real-time systems
PPTX
Introduction to real time software systems script
PPTX
System of systems classification
PPTX
Reuse landscape
PPTX
Introduction to systems of systems
PPTX
Scaling agile
PPTX
Agile methods for large systems
PPTX
User stories
PPTX
Agile and plan based development processes
PPTX
Fundamental software engineering activities
PPTX
Introducing Software Engineering
PPTX
Why se script
PPTX
Ariane 5 launcher failure
PPTX
Airbus Flight Control System
PPTX
Warsaw airbus accident
PPTX
Stakeholders, viewpoints and concerns
PPTX
Requirements engineering processes
PPTX
Requirements engineering challenges
PPTX
Intro to requirements eng.
PPTX
Emergent properties
Architectural patterns for real-time systems
Introduction to real time software systems script
System of systems classification
Reuse landscape
Introduction to systems of systems
Scaling agile
Agile methods for large systems
User stories
Agile and plan based development processes
Fundamental software engineering activities
Introducing Software Engineering
Why se script
Ariane 5 launcher failure
Airbus Flight Control System
Warsaw airbus accident
Stakeholders, viewpoints and concerns
Requirements engineering processes
Requirements engineering challenges
Intro to requirements eng.
Emergent properties

Recently uploaded (20)

PDF
KodekX | Application Modernization Development
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Approach and Philosophy of On baking technology
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Electronic commerce courselecture one. Pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPT
Teaching material agriculture food technology
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Encapsulation theory and applications.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
KodekX | Application Modernization Development
Dropbox Q2 2025 Financial Results & Investor Presentation
Approach and Philosophy of On baking technology
NewMind AI Weekly Chronicles - August'25 Week I
NewMind AI Monthly Chronicles - July 2025
Electronic commerce courselecture one. Pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Understanding_Digital_Forensics_Presentation.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Review of recent advances in non-invasive hemoglobin estimation
The Rise and Fall of 3GPP – Time for a Sabbatical?
Teaching material agriculture food technology
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Encapsulation theory and applications.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Network Security Unit 5.pdf for BCA BBA.
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Encapsulation_ Review paper, used for researhc scholars

Scada security

  • 1. SCADA security, 2013 Slide 1 SCADA systems security
  • 2. SCADA security, 2013 Slide 2 24/7 infrastructure availability • The infrastructure controlled by SCADA systems and PLCs often has to be continuously available and must operate as expected
  • 3. SCADA security, 2013 Slide 3 Continuous operation • In some cases, it may be very disruptive to switch off PLC- controlled equipment as it is impossible to predict when the system will be required
  • 4. SCADA security, 2013 Slide 4 Critical SCADA systems • Failure of controlled systems can lead to direct loss of life due to equipment failure or indirect losses due to failure of the critical infrastructure controlled by SCADA systems • SCADA must therefore be dependable – Safety and reliability – Security
  • 5. SCADA security, 2013 Slide 5 SCADA safety and reliability • SCADA safety and reliability – Needs specific safety analysis techniques for PLCs because they are programmed in a different way (ladder logic) – SCADA systems are designed with redundancy and backup, which contributes to the availability of these systems
  • 6. SCADA security, 2013 Slide 6 SCADA security
  • 7. SCADA security, 2013 Slide 7 SCADA legacy systems • Security through isolation – SCADA systems, historically, were unconcerned with security because they were isolated systems • Security through obscurity – Non-standard programming languages and protocols used.
  • 8. SCADA security, 2013 Slide 8 Security through isolation • If a system is not connected to the Internet, then it cannot be penetrated by attacks from the Internet • This is the so-called ‘air gap’ between the SCADA system and the rest of the world
  • 9. SCADA security, 2013 Slide 9 Maroochy Water Breach • The Maroochy Water Breach (see video) was a cyberattack on a sewage treatment system in Australia carried out by an insider
  • 10. SCADA security, 2013 Slide 10 Security through obscurity • Approach to security that is based on the fact that information about a system is not widely known or available so the assumption is that few people can successfully attack the system from outside
  • 11. SCADA security, 2013 Slide 11 Security through obscurity • Susceptible to insider attack from those who know the information inside the organization • SCADA systems are sold globally – therefore information is available to other countries who may be potentially hostile • Information on SCADA systems can be stolen and used by attackers
  • 12. SCADA security, 2013 Slide 12 SCADA connectivity • 3rd generation SCADA systems are now reliant on standard IT technologies and protocols (Microsoft Windows, TCP/IP, web browsers, organisational wireless networks, etc.) • Integrated with older SCADA systems
  • 13. SCADA security, 2013 Slide 13 Internet-based SCADA
  • 14. SCADA security, 2013 Slide 14 SCADA legacy systems • There are a huge number of 2nd generation SCADA systems that are still in use and are likely to remain in use for many years – Infrastructure systems can have a 20+ year lifetime • However, these are now being ‘updated’ with new equipment which is network-connected • These older legacy systems were developed without security awareness and so are particularly vulnerable to attack
  • 15. SCADA security, 2013 Slide 15 The myth of the ‘air gap’ • Direct connections to vendors for maintenance, stock ordering etc. • Connected to enterprise systems, which in turn are on the Internet.
  • 16. SCADA security, 2013 Slide 16 The myth of the air gap • PCs used by operators may be multi- functional and internet connected • Operators transfer information using USB drives
  • 17. SCADA security, 2013 Slide 17 SCADA vulnerabilities
  • 18. SCADA security, 2013 Slide 18 SCADA security vulnerabilities • Weak passwords • Open to port scanning to discover SCADA systems on network • Lack of input validation –buffer overflow and SQL poisoning • Unencrypted network traffic
  • 19. SCADA security, 2013 Slide 19 SCADA security challenges • SCADA systems and PLC software is normally developed by engineering companies with very limited experience of developing secure systems • The system developers are usually domain experts (oil and gas engineers, power engineers, etc.) rather than software engineers. • They may have had no training in security techniques.
  • 20. SCADA security, 2013 Slide 20 SCADA security challenges • Not always possible to use standard security tools and techniques: – It may not be possible to install anti-virus protection on process control systems, owing to the lack of processor power on legacy systems, the age of operating systems or the lack of vendor certification.
  • 21. SCADA security, 2013 Slide 21 SCADA security challenges • Security testing on process control systems must also be approached with extreme caution – security scanning can seriously affect the operation of many control devices. • There are sometimes few opportunities to take the systems off-line for routine testing, patching and maintenance.
  • 22. SCADA security, 2013 Slide 22 Improving SCADA security • Government and industry reports to raise awareness of SCADA security issues • Establishment of bodies specifically concerned with infrastructure protection who can advise on SCADA system security
  • 23. SCADA security, 2013 Slide 23 Improving SCADA security • Better security education and training for SCADA developers • Need for regulators to become involved – security certification
  • 24. SCADA security, 2013 Slide 24 © David Shankbone 2012
  • 25. SCADA security, 2013 Slide 25 Summary • Government organisations are seriously concerned about the vulnerability of SCADA systems to cyberattacks and the consequences for our national infrastructure • SCADA systems connected to internet so vulnerable to external attack • SCADA systems are often old systems that were built without security concerns – therefore are vulnerable to external attack