Our everyday lives heavily depend on Critical Infrastructures and SCADA systems are one of their major backbones. The IT science has managed to create subsystems and protocols that combine electrical and mechanical technology to monitor and command a plethora of Remote Terminal Units or PLCs, forming a network of devices and computers. Unfortunately, the primal protocols do not include the security mindset as they have been built with no vision or with air-gapped intensions. Todays’ world though is interconnected and the need to monitor everything from a distance is essential. This is also the entry point for a malicious user to attempt cyber-attacks against Critical Infrastructures by taking advantage the naivety of SCADA implementation at its total.
In this thesis, a simulated SCADA environment is attacked by using open source tools in various ways to achieve the disruption of the normal behavior of the system. The experiments are proportionally less disruptive in malfunctions and in numbers but manage to raise attention and thoughts around the old protocols that are still being used in many SCADA systems some of which in Critical Infrastructures.
Collections
Show Collections