ABSTRACT

This chapter describes the concept of designing for process integrity. Too often, supervisory control and data acquisition (SCADA) and control systems are discussed in isolation of everything that they monitor and control. Yet the processes these systems control are the very reason for their existence. It is as if one were fascinated with the knobs, displays, and buttons of an autopilot to the exclusion of the rest of the aircraft. This chapter describes engineering tips and analysis that can be used to secure a process at the very lowest levels. This chapter will also discuss dependencies of the control system on infrastructure such as virtual private networks (VPN), satellite, and wireless radio networks. It will also discuss policies that can be used to secure (or abused to violate) process integrity.