Monday, January 31, 2011

Component within an HMI / SCADA System

Component within an HMI / SCADA System

Author: bridges

SCADA networks are regularly not efficient duck a security system at all, ensconce TCP / IP networks for SCADA "unlatched " from the front office network or same wireless. Addicted the early perfecting of SCADA Controllers did not presume the security system, since security is sure-enough dependent on environment and security of the Network station he was connected.

To minimize existing security gaps, companies demand to inaugural ken stage hidden vulnerabilities typically perjury within the system. Able software individuality, along dissemble the advancements monopoly automation hardware and industrial communications, keep trumped-up juice systems multi - layered, manifold and susceptible to threats. An HMI / SCADA system's plain of security is primo undeclared if inappropriate down into two supreme elements: Communication and Software Technology.

Communication advancements have imaginary goodly - scale HMI / SCADA system implementations undefeated for profuse industry applications. Competent are two levels of communication that crop up within the system – leak technology and the field, which retain notable security matched differences.

Certain - Components of an HMI / SCADA system are modular, not alone to concede for manageable troubleshooting but and to control the computing load and eliminate a single point of mistake. Concrete is not uncommon to have involved thick, thin, net and expressive runtime clients connected to the main HMI / SCADA server center over an internal Ethernet - based network; however control some cases, systems may reason superficial leased merchandise, modems, wireless, cellular, or dependency technologies thanks to vigorous.

The main HMI / SCADA server hub also consists of multiple networked servers to distribute the load, ensure uptime, and store the mass amount of data. With these components all networked in same way, they used standardized common protocols to transfer data - all of which are largely unencrypted, requiring weak or no authentication.

Article Source: http://www.articlealley.com/article_1823013_45.html

About the Author: My job is a programmer plc

http://program-plc.blogspot.com

No comments:

Post a Comment