Description
Supervisory Control and Data Acquisition (SCADA) systems are types of Industrial Control Systems that play a critical role in the key infrastructure and critical resources of many nations. SCADA systems are made up of hardware and software that aid in the automation and control of equipment that perform tasks throughout society. Some examples of these tasks may include, but are not limited to, monitoring drinking water, controlling dams, monitoring power grids, controlling oil pipelines, controlling chemical plants and controlling military weapons systems. Recently, there has been a series of cyber-attacks and publications that demonstrate weaknesses in SCADA security. These vulnerabilities pose serious threats to infrastructure and society. The goal of this research is to introduce more effective ways of identifying potentially exploitable SCADA systems and to present new SCADA software vulnerabilities.