{"id":270,"date":"2026-04-25T18:23:37","date_gmt":"2026-04-25T18:23:37","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/alewi073\/?p=270"},"modified":"2026-04-25T18:23:37","modified_gmt":"2026-04-25T18:23:37","slug":"write-up-april-09-2026","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/alewi073\/2026\/04\/25\/write-up-april-09-2026\/","title":{"rendered":"Write Up &#8211; April 09, 2026"},"content":{"rendered":"\n<p><strong>SCADA Systems<\/strong><\/p>\n\n\n\n<p><strong>BLUF:<br><\/strong>Critical infrastructure systems are vulnerable to cyberattacks because they rely on<br>connected networks and sometimes outdated security. SCADA systems help manage and<br>monitor these systems, but they also create risks that need to be secure properly (p.3,<br>SCADA Systems).<br><\/p>\n\n\n\n<p><strong>Introduction:<\/strong><br>Critical infrastructure incudes systems we depend on daily, like electricity, water, and<br>transportation. These systems use SCADA (Supervisory Control and Data Acquisition) to<br>control and monitor operations. While SCADA improves eQiciency, it also increases<br>exposure to cyber threats due to network connectivity (p.2, SCADA Systems).<br><\/p>\n\n\n\n<p><strong>Vulnerabilities in Critical Infrastructure:<\/strong><br>One major vulnerability is unauthorized access to SCADA systems. If attackers gain<br>access, they can control physical processes like pipelines or electricity systems, which can<br>have serious consequences. Many SCADA systems were not originally built with strong<br>cybersecurity protections, making them easier to exploit (p. 5, SCADA Systems).<br>Another issue is insecure communication. SCADA systems rely on data being transmitted<br>between devices, and in some cases, these communication protocols lack proper security.<br>This means attackers could send malicious commands or intercept data (p. 6, SCADA<br>Systems)<br>There is also a common misconception that SCADA Systems are safe because they are<br>physically secured. However, even limited access points can still be used to attack the<br>system, especially if security measures are weak (p. 7, SCADA Systems)<br><\/p>\n\n\n\n<p><strong>Role of SCADA in Risk Mitigation:<\/strong><br>Despite these vulnerabilities, SCADA systems also help reduce risks when used correctly.<br>They provide real time monitoring, allowing operators to quickly detect issues and respond<br>before they escalate. Alarm systems and alerts help notify operators when something goes<br>wrong (p. 8, SCADA Systems).<br>SCADA Systems also improve reliability by using backup systems and redundancy. If one<br>component fails, another can take over, helping maintain operations without interruption.<br>This is especially important for critical infrastructure where downtime could be dangerous<br>(pg. 9, SCADA Systems).<br>Additionally, modern SCADA Systems are starting to include better security features, such<br>as firewalls, VPNs, and system monitoring tools. These features help prevent unauthorized access and protect systems from cyberthreats when properly implemented (p. 10, SCADA<br>Systems).<br><\/p>\n\n\n\n<p><strong>Conclusion:<\/strong><br>SCADA system plays a major role in managing critical infrastructure, but they also<br>introduce cybersecurity risks. These vulnerabilities can lead to serious damage if not<br>addressed. By improving security and using SCADA systems eQectively, organizations can<br>better protect critical infrastructure from cyber threats (p. 11, SCADA Systems).<br>References:<br>Using SCADA to Protect Critical Infrastructure and Systems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>SCADA Systems BLUF:Critical infrastructure systems are vulnerable to cyberattacks because they rely onconnected networks and sometimes outdated security. SCADA systems help manage andmonitor these systems, but they also create risks that need to be secure properly (p.3,SCADA Systems). Introduction:Critical infrastructure incudes systems we depend on daily, like electricity, water, andtransportation. These systems use SCADA (Supervisory [&hellip;]<\/p>\n","protected":false},"author":32118,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":7},"categories":[7],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/posts\/270"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/users\/32118"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/comments?post=270"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/posts\/270\/revisions"}],"predecessor-version":[{"id":271,"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/posts\/270\/revisions\/271"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/media?parent=270"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/categories?post=270"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/tags?post=270"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}