7/17/2019 SCADA Security Example http://slidepdf.com/reader/full/scada-security-example 1/8 SCADA Security Example Christian Paulino and Janusz Zalewski Florida Gulf Coast University December 2012 1. Introduction SCADA systems are always connected to a network, so they are vulnerable to attack. With many vulnerabilities that may affect SCADA, in general, in this project the focus is on network intrusions through viruses, worms, and other types of malicious code. A key element for any network to protect against these kinds of risks is the firewall, which needs to be configured appropriately based on the needs of the system. The case study in this project is the security of FGCU’s SCADA system. Fig. 1. Packet filtering process After the security risks have been determined, this project implements a way to possibly improve security. The firewall on the SCADA server is used to do packet filtering. Packet filtering examines the packets that are sent to the network. It checks the source IP address, the destination IP address, and the Internet protocols involved. This process is shown in Figure 1. The Windows firewall can be configured to either permit or deny incoming packets. Rules are created that allow only the necessary connections for operation of the project’s SCADA system. This will help ensure connection requests with malicious intent cannot be granted.
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.