The SCADA was developed. The goal was to create a control system that will provide good performance and have features that will make it easy to control and could do the tasks easily. Security was not a concern then. Common misconception regarding SCADA security was SCADA networks were isoloated from all other networks and so attackers could not access the system. As the industry grows, the demand for more connectivity also increased. From a small range network, SCADA systems are sometimes connected to other networks to increase the scope. This situation give rise to new security concerns to these SCADA networks. Once the SCADA network is connected to other networks, it is also open to threats that connected is open to attackers. This makes the SCADA system also vulnerable (Andrew 2005).
The use of open standards for SCADA communication protocols are also increasing. Main reason is because its not as costly as proprietary standards. This reason makes it also easier for attackers to gain access to information in SCADA systems. Devices that are designed to operate in safety-critical environments are usually designed to failsafe, but security vulnerabilities could be exploited by an attacker to disable the fail-safe mechanisms. This makes these devices must not only be designed for safety but also for security.
Stuxnet worm
Recent revelations about the wide-scale and targeted Stuxnet worm attack directed at a nuclear power plant in Iran should raise red flags to all IT security professionals and managers of critical infrastructure facilities, such as power plants, air traffic control sites and government agencies, around the world. Officials with the US Department of Homeland Security warned that hackers could attack the country's power generation plants, water treatment facilities, and other critical infrastructure with clones of the Stuxnet computer worm, which was used ...