Beruflich Dokumente
Kultur Dokumente
SCADA
Supervisory control and data acquisition (SCADA) is a control
system architecture that uses computers, networked data communications
and graphical user interfaces for high-level process supervisory
management, but uses other peripheral devices such as programmable
logic controllers and discrete PID controllers to interface to the process
plant or machinery. The operator interfaces which enable monitoring and
the issuing of process commands, such as controller set point changes, are
handled through the SCADA supervisory computer system. However, the
real-time control logic or controller calculations are performed by
networked modules which connect to the field sensors and actuators.
Level 2 contains the SCADA software and computing platform. The SCADA
Levels 3 and 4 are not strictly process control in the traditional sense, but
are where production control and scheduling takes place.
SCADA systems typically use a tag database, which contains data elements
called tags or points, which relate to specific instrumentation or actuators
within the process system according to such as the Piping and
instrumentation diagram. Data is accumulated against these unique
process control equipment tag references.
Examples of use
Both large and small systems can be built using the SCADA concept. These
systems can range from just tens to thousands of control loops, depending
on the application. Example processes include industrial, infrastructure,
Supervisory computers
This is the core of the SCADA system, gathering data on the process and
sending control commands to the field connected devices. It refers to the
computer and software responsible for communicating with the field
connection controllers, which are RTUs and PLCs, and includes the HMI
software running on operator workstations. In smaller SCADA systems, the
supervisory computer may be composed of a single PC, in which case the
HMI is a part of this computer. In larger SCADA systems, the master
station may include several HMIs hosted on client computers, multiple
servers for data acquisition, distributed software applications, and disaster
recovery sites. To increase the integrity of the system the multiple servers
will often be configured in a dual-redundant or hot-standby formation
Also known as PLCs, these are connected to sensors and actuators in the
process, and are networked to the supervisory system in the same way as
RTUs. PLCs have more sophisticated embedded control capabilities than
RTUs, and are programmed in one or more IEC 61131-3 programming
languages. PLCs are often used in place of RTUs as field devices because
they are more economical, versatile, flexible and configurable.
Communication infrastructure
Human-machine interface
Play media
More complex SCADA animation showing control of four batch
cookers
through the pipe. The operator can switch the pump off from the mimic by
a mouse click or screen touch. The HMI will show the flow rate of the fluid
in the pipe decrease in real time.
Alarm handling
PLC/RTU programming
Since about 1998, virtually all major PLC manufacturers have offered
integrated HMI/SCADA systems, many of them using open and non-
proprietary communications protocols. Numerous specialized third-party
HMI/SCADA packages, offering built-in compatibility with most major
PLCs, have also entered the market, allowing mechanical engineers,
electrical engineers and technicians to configure HMIs themselves, without
the need for a custom-made program written by a software programmer.
The Remote Terminal Unit (RTU) connects to physical equipment.
Typically, an RTU converts the electrical signals from the equipment to
digital values such as the open/closed status from a switch or a valve, or
measurements such as pressure, flow, voltage or current. By converting
and sending these electrical signals out to equipment the RTU can control
equipment, such as opening or closing a switch or a valve, or setting the
speed of a pump.
RTUs and other automatic controller devices were developed before the
advent of industry wide standards for interoperability. The result is that
developers and their management created a multitude of control protocols.
Among the larger vendors, there was also the incentive to create their own
protocol to "lock in" their customer base. A list of automation protocols is
compiled here.
OLE for process control (OPC) can connect different hardware and
software, allowing communication even between devices originally not
intended to be part of an industrial network.
Security issues
SCADA systems that tie together decentralized facilities such as power, oil,
gas pipelines, water distribution and wastewater collection systems were
designed to be open, robust, and easily operated and repaired, but not
necessarily secure.[18] The move from proprietary technologies to more
standardized and open solutions together with the increased number of
connections between SCADA systems, office networks and the Internet has
made them more vulnerable to types of network attacks that are relatively
common in computer security. For example, United States Computer
Emergency Readiness Team (US-CERT) released a vulnerability
advisory[19] warning that unauthenticated users could download sensitive
configuration information including password hashes from an Inductive
Automation Ignition system utilizing a standard attack type leveraging
access to the Tomcat Embedded Web server. Security researcher Jerry
Brown submitted a similar advisory regarding a buffer overflow
vulnerability[20] in a Wonderware InBatchClient ActiveX control. Both
vendors made updates available prior to public vulnerability release.
Mitigation recommendations were standard patching practices and
requiring VPN access for secure connectivity. Consequently, the security of
some SCADA-based systems has come into question as they are seen as
potentially vulnerable to cyber attacks.[2][21][22]
the belief that SCADA systems have the benefit of security through
obscurity through the use of specialized protocols and proprietary
interfaces
the belief that SCADA networks are secure because they are physically
secured
the belief that SCADA networks are secure because they are
disconnected from the Internet
There are many threat vectors to a modern SCADA system. One is the
threat of unauthorized access to the control software, whether it is human
access or changes induced intentionally or accidentally by virus infections
and other software threats residing on the control host machine. Another is
the threat of packet access to the network segments hosting SCADA
devices. In many cases, the control protocol lacks any form of
cryptographic security, allowing an attacker to control a SCADA device by
sending commands over a network. In many cases SCADA users have
assumed that having a VPN offered sufficient protection, unaware that
security can be trivially bypassed with physical access to SCADA-related
network jacks and switches. Industrial control vendors suggest
approaching SCADA security like Information Security with a defense in
depth strategy that leverages common IT practices.[23]
In April 2008, the Commission to Assess the Threat to the United States
from Electromagnetic Pulse (EMP) Attack issued a Critical Infrastructures
Report which discussed the extreme vulnerability of SCADA systems to an
electromagnetic pulse (EMP) event. After testing and analysis, the
Commission concluded: "SCADA systems are vulnerable to an EMP event.
The large numbers and widespread reliance on such systems by all of the
Nation’s critical infrastructures represent a systemic threat to their
continued operation following an EMP event. Additionally, the necessity to
reboot, repair, or replace large numbers of geographically widely dispersed
systems will considerably impede the Nation’s recovery from such an
assault."[25]
Many vendors of SCADA and control products have begun to address the
risks posed by unauthorized access by developing lines of specialized
industrial firewall and VPN solutions for TCP/IP-based SCADA networks
See also
DNP3
IEC 60870
EPICS
References
External links