This document discusses security controls in SCADA (Supervisory Control and Data Acquisition) systems. It describes SCADA systems as software used to monitor and control industrial processes by collecting data from remote devices. The document outlines the evolution of SCADA systems through three generations from co-located control to increasingly networked and internet-connected systems. It also discusses key SCADA functions, features, applications, advantages and disadvantages. Security threats to SCADA systems are mentioned, along with reasons for weaknesses like poor training and development issues.