Examples of use of SCADA
1. This initiative will addresses critical security needs and research requirements to develop a dynamic, adaptive cybersecurity infrastructure, focused in areas of data mining, intrusion detection and analysis, development of a variety of security tools, training and SCADA field testing.
2. "Hackers have discovered that owners of SCADA systems are very sensitive and that they can make money by threatening to do damage," Paller said, adding that he is aware of at least two incidents just this year in which attackers broke into and threatened to disrupt utility operations unless the owners paid a ransom demand.
3. "We also know they have the desire to go after Scada [supervisory control and data acquisition] systems which control real–world things – like the opening or closing of a dam or whether an elevator goes up or down." But Bruce Schneider, a leading cryptographer and founder of Counterpane Internet Security, points out that such attacks are yet to happen.
4. "But cyber is now also the vehicle of choice for the bad guys to deliver and organize their services." Security experts say many of the computers that operate critical infrastructure –– known as supervisory control and data acquisition (SCADA) networks – are increasingly being connected to Microsoft Windows systems and to the Internet to offer public utilities a cost–effective way to manage their far–flung assets.