Skip to main content

Is Technology Security Keeping You Away From Data You Need?

The full text article is not available for purchase.

The publisher only permits individual articles to be downloaded by subscribers.

or click here to sign up for a free trial

Abstract:

For the past 20 years, utility managers have worked hard to gain access to valuable data captive in process control systems (PCS) including SCADA. Unfortunately, security precautions implemented in the wake of the 9-11 terrorist attacks have now curtailed access to that data for many utility decision makers. A recent WERF/AwwaRF research project, led by EMA, was designed to determine current vulnerabilities and consequences and to quantify vulnerabilities for water and wastewater utilities. What the research project found may come as a surprise to many utility managers.

In the past, automated systems were resilient largely due to complex communication protocols, proprietary real-time operating systems, and limited connectivity. Because of these safeguards and protocols, it was unlikely that an intruder could create commands on the fly to start, stop, open, close, or otherwise disrupt operating equipment. Today's technology has changed that, leaving SCADA and PCS systems vulnerable to intrusions. At the same time, the information contained in these systems is necessary to facilitate effective day-to-day operations of the utility and management decision-making. The data is required throughout the organization to make better decisions while managing the operation.

In the wake of 9–11, many utilities have limited access to this data by isolating their automation systems from other networks in an attempt to be more secure, negating the operational benefits of access to SCADA and process control system data. As part of this project, 11 U.S. utilities (small to large) participated in the research, testing, and validation of guidance, recommendations and a self assessment tool. Self-analysis by participating utilities revealed a number of shortcomings in existing security policies, procedures, and practices. Field studies confirmed these results and even further vulnerabilities – i.e., you don't know what you don't know. Most importantly, it was shown that just because the SCADA and PCS systems are isolated from the rest of the utility's computer networks – thus preventing data access – doesn't mean these systems are secure against different sets of threats and scenarios. The research project has produced valuable findings for all utilities, results that give managers the information needed and tools to protect their core business operation of facilities and infrastructure. Just as important, however, is the discovery that adequate protection of automation technology does not require utility managers to forego use of valuable data produced by these systems. This presentation will explain how to keep systems secure and retain access to key data.

Document Type: Research Article

DOI: http://dx.doi.org/10.2175/193864706783789842

Publication date: January 1, 2006

More about this publication?
  • Proceedings of the Water Environment Federation is an archive of papers published in the proceedings of the annual Water Environment Federation® Technical Exhibition and Conference (WEFTEC® ) and specialty conferences held since the year 2000. These proceedings are not peer reviewed.

    WEF Members: Sign in (right panel) with your IngentaConnect user name and password to receive complimentary access.
  • Subscribe to this Title
  • Membership Information
  • About WEF Proceedings
  • WEFTEC Conference Information
  • Ingenta Connect is not responsible for the content or availability of external websites

Access Key

Free Content
Free content
New Content
New content
Open Access Content
Open access content
Partial Open Access Content
Partial Open access content
Subscribed Content
Subscribed content
Free Trial Content
Free trial content
Cookie Policy
X
Cookie Policy
Ingenta Connect website makes use of cookies so as to keep track of data that you have filled in. I am Happy with this Find out more