This study analyses potential weaknesses of supervisory control and data acquisition (SCADA) systems and possible workarounds to safeguard the critical infrastructure. SCADA systems are the hardware and software that control and monitor infrastructure and industrial processes. In the world of energy, the industrial control systems monitoring the physical processes of machines are less tangible than the actual physical machines they control. One of the benefits of soft power is that it offers the ability to use coercive force and create confusion without using overt means. Disconnecting any unnecessary network connections and restricting personnel access to only essential programs will limit unwanted access to SCADA systems through backdoor networks. It has been recommended that the energy sector ought to implement back-up and defense-in-depth systems. The concept of a common computer language for SCADA has also been mentioned in the security community, but could come with challenges.
Skip Nav Destination
Article navigation
January 2015
Select Article
Pandora’s Net
Hackers have Found Vulnerabilities in the Way the Electrical Grid is Tied to the Internet
Brittany Logan is a freelance writer based in Paris.
Mechanical Engineering. Jan 2015, 137(01): 28-33 (6 pages)
Published Online: January 1, 2015
Citation
Logan, B. (January 1, 2015). "Pandora’s Net." ASME. Mechanical Engineering. January 2015; 137(01): 28–33. https://doi.org/10.1115/1.2015-Jan-1
Download citation file:
986
Views
Get Email Alerts
Cited By
Fortifying the Pipeline
Mechanical Engineering (July 2024)
Gold Medal Engineering
Mechanical Engineering (July 2024)
Generation on the Rise
Mechanical Engineering (July 2024)
What is Mechanical Engineering?
Mechanical Engineering (July 2024)
Related Articles
SCADA vs. the Hackers
Mechanical Engineering (December,2002)
The Grid Under Fire
Mechanical Engineering (December,2016)
Measuring Impact of Cybersecurity on the Performance of Industrial Control Systems
Mechanical Engineering (December,2014)
Efficiency is Easy to Hack
Mechanical Engineering (August,2017)
Related Proceedings Papers
Related Chapters
Evaluation and Recommendations for Security Information Standards in Electric Power Systems
International Conference on Computer Technology and Development, 3rd (ICCTD 2011)
The Study of Sniffing Techniques and Defensive Strategy in WIFI
International Conference on Information Technology and Computer Science, 3rd (ITCS 2011)
Risk Mitigation for Renewable and Deispersed Generation by the Harmonized Grouping (PSAM-0310)
Proceedings of the Eighth International Conference on Probabilistic Safety Assessment & Management (PSAM)