The threat to SCADA systems is largely hypothetical today, but experts see real incidents around the corner Industrial control systems, including SCADA (supervisory control and data acquisition) have come under the security spotlight in recent years following a sprinkling of incidents – most notably the Slammer worm infestation at Ohio’s Davis-Besse nuclear power plant in 2003, and post-9-11 attention to terrorist threats.But SCADA security is a tough nut to crack, buried beneath a complex mix of technology, attitude and a particularly intractable set of network characteristics. Still, industry experts see the risk to SCADA systems growing in the not-too-distant future. Not only are there very real dangers, but regulatory agencies are beginning to take notice and impose requirements.Matthew Luallen, owner of Encari, a Chicago-based information security consultancy, points out that the electric utility industry is already under a three-year program to improve security. The sanctions for noncompliance, he says, can run up to $1 million a day.Fundamentally, the control world has changed, particularly at the high end with methods like SCADA. There are more open systems, wireless technologies are becoming popular and there’s increased connectivity, both internally and externally. There are more outsourced services and strategic alliances among vendors, which encourages openness and interoperability. Plant environments have become complex with multiple vendors’ equipment, proprietary systems and mission-critical applications all tied together in complex networks; all must function in a time-constrained fashion. “Supervisory and information control systems in manufacturing facilities are evolving rapidly, and with the technological advances come security risks,” Wonderware VP of global product management Rashesh Mody said in a recent white paper.Lack of understanding between industrial automation and corporate IT is also a problem. Automation has evolved along very different pathways than corporate IT, and relations between the two groups all too often run from mutual incomprehension to outright hostility. There is not even a lot of agreement about the level of the threat. The people in the controls business see problems as unlikely because of the separation between factory and office networks. Computer security experts like Alan Paller of the SANS Institute see the danger as very real.Paller points out that most of the incidents that have attracted attention involved highly regulated industries such as nuclear power plants, which are required to report out-of-the-ordinary activity.“The fundamental problem is that although senior executives were told SCADA systems are not connected to the Internet, in fact they’re connected to routers, and those routers are connected,” Paller says.The availability of security features in control system software also varies widely. As CERN, the international physics laboratory in Geneva, noted in a November 2007 report, “vulnerability scans at CERN using standard IT tools have shown that commercial automation systems often lack even fundamental security precautions: Some systems crashed during the scan, while others could easily be stopped or have their process data altered.”However, some of the control system vendors are taking security seriously. After the well-publicized discovery of a security flaw in its SuiteLink product, Wonderware began an extensive campaign to upgrade the security of its products.Further, a lot of the doomsday scenarios are overblown. Andrew Ongun, general manager of Evolutionary Commercial Systems, a Huntington Beach, Calif., consultancy specializing in control systems, points out that, for example, a lot of the equipment has built-in sanity checks that won’t allow parameters to reach dangerous levels, no matter how badly the system is hacked. Related content news Google Chrome zero-day jumps onto CISA's known vulnerability list A serious security flaw in Google Chrome, which was discovered under active exploitation in the wild, is a new addition to the Cybersecurity and Infrastructure Agency’s Known Exploited vulnerabilities catalog. By Jon Gold Oct 03, 2023 3 mins Zero-day vulnerability Vulnerabilities Security brandpost The advantages and risks of large language models in the cloud Understanding the pros and cons of LLMs in the cloud is a step closer to optimized efficiency—but be mindful of security concerns along the way. By Daniel Prizmant, Senior Principal Researcher at Palo Alto Networks Oct 03, 2023 5 mins Cloud Security news Arm patches bugs in Mali GPUs that affect Android phones and Chromebooks The vulnerability with active exploitations allows local non-privileged users to access freed-up memory for staging new attacks. By Shweta Sharma Oct 03, 2023 3 mins Android Security Vulnerabilities news UK businesses face tightening cybersecurity budgets as incidents spike More than a quarter of UK organisations think their cybersecurity budget is inadequate to protect them from growing threats. By Michael Hill Oct 03, 2023 3 mins CSO and CISO Risk Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe