Cybersecurity Reference > Glossary
What is Supervisory Control and Data Acquisition (SCADA)?
SCADA systems collect real-time data from sensors, instruments, and other devices distributed across large geographical areas, then transmit this information to a central control room where operators can monitor operations and issue commands to remote equipment.
These systems are fundamental to the operation of power grids, water treatment facilities, oil and gas pipelines, manufacturing plants, and other critical infrastructure. A typical SCADA system consists of human-machine interfaces (HMIs), remote terminal units (RTUs), programmable logic controllers (PLCs), and communication networks that connect these components.
SCADA systems present significant cybersecurity challenges because they were originally designed for reliability and functionality rather than security, often operating on legacy systems with limited security features. Many SCADA networks were historically isolated from corporate networks and the internet, but increasing connectivity for remote monitoring and efficiency improvements has expanded their attack surface. Successful cyberattacks against SCADA systems can have devastating consequences, potentially causing power outages, environmental disasters, or disruption of essential services.
Origin
The security landscape changed dramatically in the 1990s and 2000s when organizations began connecting SCADA systems to corporate networks and, in some cases, the internet. This connectivity brought operational benefits but introduced vulnerabilities that had never been considerations in the original design. The Stuxnet attack in 2010 marked a turning point in how the world understood SCADA security—it demonstrated that highly sophisticated adversaries could weaponize malware specifically to destroy physical infrastructure through cyber means.
Since then, the proliferation of internet-connected industrial devices and the convergence of information technology with operational technology has created an entirely new threat landscape. What were once air-gapped systems now often exist on networks with multiple connection points to the outside world.
Why It Matters
The challenge isn't just theoretical. Attackers have repeatedly demonstrated their ability to compromise SCADA systems, from the Ukrainian power grid attacks to incidents affecting manufacturing facilities worldwide. Nation-state actors view critical infrastructure as legitimate targets during conflicts, while ransomware groups increasingly target industrial operations because the cost of downtime creates pressure to pay.
Many SCADA environments still run on decades-old hardware and software that can't be easily patched or updated without risking operational disruptions. These systems often lack basic security controls like authentication, encryption, or logging that are standard in modern IT environments. The convergence of operational technology with IT networks has created pathways for attackers to move from compromised business systems into industrial control environments. Organizations must balance the operational necessity of reliable systems against the security imperative to protect against increasingly sophisticated threats.
The Plurilock Advantage
Our operational technology, industrial control, and SCADA security testing services identify vulnerabilities without disrupting operations, while our adversary simulation work helps organizations understand realistic attack scenarios against their critical systems.
We don't just deliver reports—we help you implement practical security improvements that work within the constraints of industrial environments.
.
Need Help Securing Your SCADA Systems?
Plurilock offers specialized SCADA security assessments to protect your critical infrastructure.
Get SCADA Security Assessment → Learn more →




