As with any advantage, however, there are also downsides. At the heart of most IIoT systems throughout any industry is what is referred to as Supervisory Control and Data Acquisition (SCADA) applications. A combination of hardware and software, SCADA “is an automation control system that is used in industries… [to] provide the user with remote controls of any equipment in a given system” (Krambeck, 2015). A prominent instance of the exploitation of one of these systems, outside of the incident in Ukraine, is what General Hayden referred to as the “crossing of the Rubicon event” of Stuxnet back in 2010 on the Iranian Natanz nuclear facility (Hayden, 2016). Decreasing enrichment efficiency by approximately 30%, this was the first instance of a cyber version of August 1945 when the United States decided to drop two nuclear bombs on Nagasaki and Hiroshima (Holloway, 2015). Without losing a single soldier on the battlefield, a (speculated) nation-state was able to set back Iranian nuclear efforts for years, sending a strong signal to Tehran and the rest of the world that cyberspace is open for
As with any advantage, however, there are also downsides. At the heart of most IIoT systems throughout any industry is what is referred to as Supervisory Control and Data Acquisition (SCADA) applications. A combination of hardware and software, SCADA “is an automation control system that is used in industries… [to] provide the user with remote controls of any equipment in a given system” (Krambeck, 2015). A prominent instance of the exploitation of one of these systems, outside of the incident in Ukraine, is what General Hayden referred to as the “crossing of the Rubicon event” of Stuxnet back in 2010 on the Iranian Natanz nuclear facility (Hayden, 2016). Decreasing enrichment efficiency by approximately 30%, this was the first instance of a cyber version of August 1945 when the United States decided to drop two nuclear bombs on Nagasaki and Hiroshima (Holloway, 2015). Without losing a single soldier on the battlefield, a (speculated) nation-state was able to set back Iranian nuclear efforts for years, sending a strong signal to Tehran and the rest of the world that cyberspace is open for