The scada technology projects are popularly chosen ones for final engineering, BE projects. By the electrical engineering student projects and computer science projects.
As Wikipedia says SCADA technology is, SCADA (supervisory control and data acquisition) generally refers to industrial control systems (ICS): computer systems that monitor and control industrial, infrastructure, or facility-based processes, as described below:
Industrial processes include those of manufacturing, production, power generation, fabrication, and refining, and may run in continuous, batch, repetitive, or discrete modes.
Infrastructure processes may be public or private, and include water treatment and distribution, wastewater collection and treatment, oil and gas pipelines, electrical power transmission and distribution, Wind farms, civil defense siren systems, and large communication systems.
Facility processes occur both in public facilities and private ones, including buildings, airports, ships, and space stations. They monitor and control HVAC, access, and energy consumption.
In this particular project about the maintenance of proper cyber security and information handling in the industries with the help of core SCADA. Here in this project a centralized security system is integrated and operated along the SCADA. Via this system the various data is collected from the available sources and processed by the central system. Then handed to the various outputs and display units, which are user handeld. This system is highly useful for security purposes with high level accuracy.
Random samples: The SSM collects security related data for display and operator action. This data includes Intrusion Detection System (IDS) monitoring with SCADA signatures, SCADA security alarms, SCADA user connections, SCADA Remote Terminal Unit (RTU) & Inter Control-Center Communications Protocol (ICCP) link status, SCADA security related telemetry, health monitoring events collected via Web Based Enterprise Management (WBEM) (for SCADA computer monitoring), and Simple Network Management Protocol (SNMP) (for network devices) via third party products, system events correlated by a third party event correlation product, and system statistics. Automatic trace-back of identified security event sources when a security event is identified, as well as automatic collection of security logs involving the event is triggered for forensic review. The invention improves the security of industrial controls systems (e.g., those for electricity transmission and distribution) with new security Situational Awareness by collecting relevant security information, visualizing it, and providing a logical workflow in the UI to control the system. A method for an optional 'autopilot' function whereby the system will automatically change security levels based on relevant inputs is provided. This work is added to an existing hardened system that already supports secure communications.
This work identifies remote access and strategically responds to elevation of security posture by isolating communications in a prioritized fashion. This work is designed to use standards and third party products common in Information Technology (IT) environments such that the solution can easily be used in an environment integrated in the enterprise. The new SSM function allows for monitoring of the security events into the system for analysis and subsequent changes in control. This work also builds upon an existing signature for the IDS, and uses the IDS as inputs to the analysis.
Download these project details here: