ICS Components

Introduction

All components that are discussed in this writing can be found in the two types of ICSes: Supervisory Control and Data Acquisition (SCADA) and Distributed Control System (DCS). An ICS environment often combines SCADA and DCS technologies in order to incorporate attributes from both systems.

In practice, these components in their entirety are the driving force behind the three basic operations in the ICS:

  • Control loop: Consists of sensors for measurement and controller hardware (e.g., programmable logic controllers, actuators, motors, control valves, switches and breakers). Sensors collect and then pass on controlled variables to the controllers
  • Human-machine interface: Operators configure control algorithms and opt for parameters in the controller hardware via an HMI displaying the status information pertaining to a specific process
  • Remote diagnostics and maintenance utilities: Devices whose primary function is to identify and recover from failure or prevent it from the outset

Enough with the basics — let’s go through these ICS components.

Servers

Control server

It is the control server that communicates with subordinate control devices across an ICS network via supervisory control software.

Input/output server (I/O server)

It collects, buffers and provides access to process information from sub-components (PLCs, RTUs and IEDs). Operators can use I/O servers to interact with third-party control components such as a control server or HMI.

Master Terminal Unit (MTU)

As the name suggests, the MTU (which is also called the SCADA server) operates as a master server in an ICS network, whereas PLC devices and remote telemetry units (RTUs) that are dispersed all over the field sides operate as slaves. In short, this device sends commands to RTUs in the field.

Data historian

There is a general need for a device to log all processed data within an ICS and perform different planning and report functions. This need (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Dimitar Kostadinov. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/Yyau78v_BsU/