{"id":293,"date":"2023-11-26T19:54:59","date_gmt":"2023-11-26T19:54:59","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/alexanderconrad-cyse200t\/?p=293"},"modified":"2023-11-26T19:54:59","modified_gmt":"2023-11-26T19:54:59","slug":"scada-systems","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/alexanderconrad-cyse200t\/2023\/11\/26\/scada-systems\/","title":{"rendered":"SCADA Systems"},"content":{"rendered":"\n<p><strong>BLUF<\/strong><\/p>\n\n\n\n<p>Supervisory control and data acquisition or SCADA refers to the industrial control<br>systems and is the practice of protecting this system using a common framework. These<br>processes usually refer to the modern industrial services such as water, natural gas, electricity<br>and transportation. Vulnerabilities associated with these systems can have a dramatic impact on<br>critical infrastructures because of how much we rely on these essential services and if attacked or<br>not protected could lead to dire consequences.<\/p>\n\n\n\n<p><strong>Vulnerabilities associated with critical infrastructure<br>systems<\/strong><\/p>\n\n\n\n<p>Critical infrastructure systems are services we use that important to our life, government,<br>business, etc. These services include healthcare systems, transportation, and power grids that<br>have moved over to a digital infrastructure to modernize which has opened up a whole new wave<br>of vulnerabilities to these systems. The areas most at risk, according to help net security, would<br>be the core infrastructures that are important to the people and economy of a country. Our very<br>way of life can be impacted since these critical systems are all things we use day to day, it could<br>even lead to the attacker gaining control over such systems which could have access to personal<br>information, banks, stocks, or more. These systems are like other online networks that are vulnerable to attack, however can be more vulnerable due to supply chain attacks because of how<br>much collateral damage can happen. Supply chain attacks is a type that a cyber attack targets the<br>trusted third party of the system and compromises that part, which eventually leads back to the<br>actual target system and causes as much damage as possible through every level they travel<br>through. This can be done through phishing, malware, and other related cyber attacks that can<br>leave technologies and networks vulnerable.<\/p>\n\n\n\n<p><strong>Role SCADA applications play in mitigating these risks<\/strong><\/p>\n\n\n\n<p>SCADA systems is one of the most common types of industrial control systems<br>(Forcepoint). SCADA stands for supervisory control and data acquisition networks is a common<br>framework of control systems used in modern industrial systems. These systems include water,<br>gas, electricity, transport. And more. Like any network system it is under constant threat from<br>bad actors in cyber-attacks that could bring down our critical infrastructures if it is not protected<br>well enough. SCADA systems are essentially the supervisor controls over everything that<br>happens in these critical infrastructures and should be used with the correct security to back it up<br>in case of attack. Any attack made to critical infrastructures can disrupt and cost our<br>infrastructure. So having this system helps process the data to be used by real-time terminals that<br>can protect these systems under the framework.<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>SCADA framework protects critical infrastructures by providing an outline and<br>supervision over controls that directly impact these systems. These systems like other networks<br>have vulnerabilities that can be exploited by bad actors to cause harm to our way of life since we<br>rely on these infrastructures. SCADA applications mitigate these risks because they provide insightful data to supervisory controls as a framework that can help to find the processes and<br>guide the system that coordinates or fixes these systems in real time to provide a more protected<br>network.<br>References:<br>The SCADA Systems article<br>https:\/\/docs.google.com\/document\/d\/1DvxnWUSLe27H5u8A6yyIS9Qz7BVt_8p2WeNHctGVbo<br>Y\/edit?usp=sharing<br>Labus, Helga. The massive impact of vulnerabilities in critical infrastructure.<br>HelpNetSecurity.com.<br>https:\/\/www.helpnetsecurity.com\/2022\/03\/15\/critical-infrastructure-security\/<br>What is SCADA Security. SCADA Network Security Defined and Explored. Forcepoint.com.<br>Retrieved November 5, 2023, from<br>https:\/\/www.forcepoint.com\/cyber-edu\/scada-security<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>BLUF Supervisory control and data acquisition or SCADA refers to the industrial controlsystems and is the practice of protecting this system using a common framework. Theseprocesses usually refer to the modern industrial services such as water, natural gas, electricityand transportation. Vulnerabilities associated with these systems can have a dramatic impact oncritical infrastructures because of how&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/alexanderconrad-cyse200t\/2023\/11\/26\/scada-systems\/\">Read More<\/a><\/div>\n","protected":false},"author":26016,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/alexanderconrad-cyse200t\/wp-json\/wp\/v2\/posts\/293"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/alexanderconrad-cyse200t\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/alexanderconrad-cyse200t\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alexanderconrad-cyse200t\/wp-json\/wp\/v2\/users\/26016"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alexanderconrad-cyse200t\/wp-json\/wp\/v2\/comments?post=293"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/alexanderconrad-cyse200t\/wp-json\/wp\/v2\/posts\/293\/revisions"}],"predecessor-version":[{"id":294,"href":"https:\/\/sites.wp.odu.edu\/alexanderconrad-cyse200t\/wp-json\/wp\/v2\/posts\/293\/revisions\/294"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/alexanderconrad-cyse200t\/wp-json\/wp\/v2\/media?parent=293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alexanderconrad-cyse200t\/wp-json\/wp\/v2\/categories?post=293"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alexanderconrad-cyse200t\/wp-json\/wp\/v2\/tags?post=293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}