We have years of experience in providing information assurance and information risk management services to all kinds of businesses. It does not matter whether you run a small start-up company or a large corporation, we will ensure your assets are protected and maintained efficiently. Our aim is to find the best form of protection for your business and provide you with the means to manage risks effectively in order to minimise financial costs and prevent damage to your reputation.
A cookie is a small file which asks permission to be placed on your computers hard drive. Once you agree, the file is added and the cookie helps analyse web traffic or lets you know when you visit a particular site. Cookies allow web applications to respond to you as an individual. The web application can tailor its operations to your needs, likes and dislikes by gathering and remembering information about your preferences.
We use traffic log cookies to identify which pages are being used. This helps us analyse data about web page traffic and improve our website in order to tailor it to customer needs. We only use this information for statistical analysis purposes and then the data is removed from the system.
Overall, cookies help us provide you with a better website by enabling us to monitor which pages you find useful and which you do not. A cookie in no way gives us access to your computer or any information about you, other than the data you choose to share with us.
You can choose to accept or decline cookies. Most web browsers automatically accept cookies, but you can usually modify your browser setting to decline cookies if you prefer. This may prevent you from taking full advantage of the website.
Supervisory Control and Data Acquisition (SCADA) is an architecture for command centres, typically, within large scale Industrial Control Systems (ICS). It has become an essential part of the industry due to easy management of remote sensors and actuators.
The SCADA architecture is designed to work in a hierarchical network. The SCADA central computer sits at the top, below that is a series of Programmable Logic Controllers (PLCs) or Remote Terminal Units (RTUs), below that is the field. The field consists of all the sensors and actuators in use by the organisation. This could be industrial entities such as water level sensors and flow control valves in a water plant or temperature sensors and heating controls in an office. The applications are too wide to list but they all follow the same basic architecture, thanks to the design of the SCADA system. The mid level units, such as PLCs, will control a portion of the sensors and/or actuators from the field, they will read sensors and report back to SCADA or receive instructions from SCADA to send to the actuators.
However, where an organisation sees this central command point for many resources as an efficient work tool, potential attackers see it as a single point target for access and control of facilities such as power grids and reservoir. This makes security for SCADA machines the top priority to all organisations that use it, that's where we come in.
Stratia Consulting has consultants that specialise in ICS and SCADA security and are fully compliant with the US NERC Critical Infrastructure Protection (NERC CIP) Standards.
We have experience in many areas of the field from telemetry systems to power generation, including UK Civil Nuclear.
Please contact us for a confidential discussion about your requirments