Skip to main content
Articles

21 Steps to Improve Cyber Security for SCADA Networks

By January 25, 2018#!28Thu, 28 Feb 2019 10:44:35 -0300p3528#28Thu, 28 Feb 2019 10:44:35 -0300p-10America/Sao_Paulo2828America/Sao_Paulox28 28am28am-28Thu, 28 Feb 2019 10:44:35 -0300p10America/Sao_Paulo2828America/Sao_Paulox282019Thu, 28 Feb 2019 10:44:35 -03004410442amThursday=904#!28Thu, 28 Feb 2019 10:44:35 -0300pAmerica/Sao_Paulo2#February 28th, 2019#!28Thu, 28 Feb 2019 10:44:35 -0300p3528#/28Thu, 28 Feb 2019 10:44:35 -0300p-10America/Sao_Paulo2828America/Sao_Paulox28#!28Thu, 28 Feb 2019 10:44:35 -0300pAmerica/Sao_Paulo2#No Comments

Data Acquisition and Supervision Systems (SCADA) contain computers and applications that perform key functions in providing essential services and amenities (eg, electricity, natural gas, gasoline, water, waste treatment, transportation) to all Americans.

As such, they are part of critical infrastructure, protecting a variety of threats that exist today in cyberspace.

By enabling the collection, data analysis, and control of equipment such as pumps and valves from remote locations, SCADA networks provide great efficiency and are widely used.

However, they also present a security risk.

The President's Critical Infrastructure Protection Council and the Department of Energy have developed 
The steps outlined here help any organization improve the security of their SCADA networks.

These steps are not meant to be prescriptive or inclusive. However, they address the essential actions to be taken to improve the protection of SCADA networks.

The steps are divided into two categories: specific actions to improve implementation and actions to establish essential underlying management processes and policies.

 

 

Source of:

The President's Critical
Infrastructure Protection Board
Office of Energy Assurance
US Department of Energy
202/287-1808

Office of Independent Oversight
and Performance Assurance
US Department of Energy
301/903-3777

 

 

 

 

Leave a Reply