Fostering SCADA and IT Relationships: An Industry Perspective
نویسندگان
چکیده
In recent years, critical infrastructure utilities have been faced with conflicting attitudes and cultural differences of where SCADA (Supervisory Control and Data Acquisition) and IT fit into an organizational structure. This lack of understanding between SCADA, IT processes, and business operations remains a concern for many utilities within the SCADA community. The importance of SCADA and IT relationships is an area of the SCADA landscape that is often unrecognised. This paper examines the results and findings of a SCADA and IT relationship survey that was undertaken to identify where SCADA operations fit within organizations around the world. It describes several proposed models that define the role and responsibility of SCADA within an organizational structure. It also presents a concept model for SCADA security responsibility and identifies key observations of SCADA and IT working together at the INL Control System Cyber Security Training in Idaho, USA. The main findings of the research suggest that clear defined roles and responsibilities for SCADA operations and SCADA security need to be established and secondly, that immediate cultural driven change is required in order to improve SCADA and IT relationships. DOI: 10.4018/ijcwt.2011070101 2 International Journal of Cyber Warfare and Terrorism, 1(3), 1-11, July-September 2011 Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. these SCADA networks with their business networks which unfortunately has exposed them to a series of vulnerabilities and risks Internet Security Systems (INL, 2005). These risks and vulnerabilities have arisen because of system development on open based communications standards like Ethernet Communications and web enabled screens. SCADA software companies have embraced the Transmission Control Protocol and Internet Protocol (TCP/IP) to improve integration across multiple systems. However, these developments have exposed the industrial sector to common Internet vulnerabilities within communication protocols, which increase the risk of attack (Pollet, 2002). More importantly, minimal recognition has been given surrounding the conflicting cultural attitudes between SCADA and IT departments amongst many utilities around the globe. Wiese (2002) claims that there are common reactions from SCADA engineers when the topic of SCADA and IT integration is raised. He argues that it is hard enough installing SCADA without opening up all sorts of project interfaces. Some examples may include but are not limited to: • Lack of understanding regarding the requirements of availability and reliability; • Lack of understanding of each other’s roles and responsibilities; • Lack of commitment between both departments; and • Support arrangements. These issues as well as others are discussed throughout this paper formulating the main research topic for discussion. The paper examines the findings of a SCADA and IT survey that was undertaken to identify where SCADA and IT fit into an organizational structure. It proposes that developing better relationships between SCADA and IT will improve better utilisation of resources, cross-skill multi-disciplined teams as well as improving SCADA security practices. The paper identifies the need for improvement and change in organizational dynamics in order to foster SCADA and IT relationships. 2. SCADA AND IT SURVEY METHODOLOGY A SCADA and IT survey was undertaken with the intention to measure where SCADA and IT fit into utilities organizational structure. The survey’s purpose was to identify the following: • Current relationship trends between SCADA and IT departments? • Should SCADA and IT be under the one operations department? • What are the security implications of integrating both SCADA and enterprise networks? (A discussion of the security implications is beyond the scope of this paper: see sources NIST, 2008; NISCC, 2005). The survey sample (see Appendix) was conducted by the authors using the SCADA Perspective mailing list and the SCADASEC mailing list. Both mailing lists are international and include members who own and operate critical infrastructure. A total of 56 members from the mailing lists participated in the survey. Majority of these members were SCADA engineers, IT professionals and security personnel. The results and findings of the survey are discussed throughout this paper. Figure 1 provides a high level overview of the participants and their industry sector. These results indicate that participants were predominantly from large utilities such as water and electricity. It should be further noted that 80% of respondents indicated they were from large organizations of greater than 200 employees. Figure 2 provides information regarding breakdown of the country of the respondents. 3. SCADA AND IT RELATIONSHIPS The adoption of Ethernet and TCP based protocols has provided many benefits to SCADA systems by improving system performance, load balancing and measurement analysis. These 9 more pages are available in the full version of this document, which may be purchased using the "Add to Cart" button on the publisher's webpage: www.igi-global.com/article/fostering-scada-
منابع مشابه
Living labs fostering innovations in the retail industry: A network perspective
preview 2 Living labs fostering innovations in the retail industry: A network perspective
متن کاملA Petri-net Model for Operational Cycle in SCADA Systems
Supervisory control and data acquisition (SCADA) system monitors and controls industrial processes in critical infrastructures (CIs) and plays the vital role in maintaining the reliability of CIs such as power, oil, and gas system. In fact, SCADA system refers to the set of control process, which measures and monitors sensors in remote substations from a control center. These sensors usually ha...
متن کاملSafeguarding Australia from Cyber-terrorism:A Proposed Cyber-terrorism SCADA Risk Framework for Industry Adoption
Terrorist groups are currently using information and communication technologies (ICTs) to orchestrate their conventional physical attacks. More recently, terrorists have been developing a new form of capability within the cyber-arena to coordinate cyber-based attacks. This paper identifies that cyber-terrorism capabilities are an integral, imperative, yet under-researched component in establish...
متن کاملFunctionality Considerations in Custom SCADA Development Tools
Supervisory control and data acquisition (SCADA) software is used to control and monitor processes throughout industry. The licensing cost of software and the bundling of potentially superfluous functionality into commercial SCADA software could lead organizations to develop their own custom SCADA development tools for internal use. It is important to understand the functionality criteria uniqu...
متن کاملSafeguarding Australia from Cyber-Terrorism: A SCADA Risk Framework
Terrorist groups are currently using information and communication technologies (ICTs) to orchestrate their conventional attacks. More recently, terrorists have been developing a new form of capability within the cyber-arena to coordinate cyber-based attacks. This chapter identifies that cyber-terrorism capabilities are an integral, imperative, yet under-researched component in establishing, an...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IJCWT
دوره 1 شماره
صفحات -
تاریخ انتشار 2011