IoT Vulnerabilities in SCADA Systems
Resumen
The emerging technologies like
Internet of Things (IoT) is an infrastructure of
interconnected objects, people, systems and
information resources together with intelligent
services to allow them to process information of the
physical and the virtual world and react. With this
possibility the Supervisory Control and Data
Acquisition (SCADA) have been taken to this level.
SCADA provides management with live data on
production operations, implementing effective
controls, and reduces costs of operation. Most
consumers and vendors may or may not be aware
or probably haven’t realized the greater threats
that are out there in the cyber world. By Applying
security standards and best practices we may be
able maintain and enhanced on minimizing the risk
by using all available tools that are out there. The
internet has grown a lot since the beginning and
there are powerful tools out there that are
accessible and resourceful from a novice level to
experience Security Professional. This project will
demonstrate how easy it’s to find the vulnerabilities
on IoT devices that are connected to SCADA
systems. To produce this finding we will use the
following search engines: SHODAN.io and
CENSYS.io that search and extract worldwide data
from devices that are currently connected to the
internet. Ones identified a security issue; a security
analyst can establish a corrective action plan to
prevent future security flaws by applying security
standards and best industries practices.
Key Terms - Internet of Things, IoT, SCADA,
Vulnerabilities.