{"id":226,"date":"2025-12-02T18:56:40","date_gmt":"2025-12-02T23:56:40","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/asherembry\/?page_id=226"},"modified":"2025-12-02T18:56:40","modified_gmt":"2025-12-02T23:56:40","slug":"scada-systems-write-up","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/asherembry\/coursework\/cyse-200t-cybersecurity-technology-society\/scada-systems-write-up\/","title":{"rendered":"SCADA Systems Write Up"},"content":{"rendered":"\n<p>In this paper I researched the vulnerabilities of Supervisory Control and Data Acquisition (SCADA) systems managing critical infrastructure in the United States. The root of its vulnerability is an aging infrastructure system and lightweight systems that are often left weakly secured or completely unsecured.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/asherembry\/wp-content\/uploads\/sites\/39490\/2025\/12\/Embry-SCADA-Systems-Write-Up-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Embry-SCADA-Systems-Write-Up-1.\"><\/object><a id=\"wp-block-file--media-ebc07ec4-765e-4120-8505-11a6fe4dfff5\" href=\"https:\/\/sites.wp.odu.edu\/asherembry\/wp-content\/uploads\/sites\/39490\/2025\/12\/Embry-SCADA-Systems-Write-Up-1.pdf\">Embry-SCADA-Systems-Write-Up-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/asherembry\/wp-content\/uploads\/sites\/39490\/2025\/12\/Embry-SCADA-Systems-Write-Up-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-ebc07ec4-765e-4120-8505-11a6fe4dfff5\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In this paper I researched the vulnerabilities of Supervisory Control and Data Acquisition (SCADA) systems managing critical infrastructure in the United States. The root of its vulnerability is an aging infrastructure system and lightweight systems that are often left weakly&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/asherembry\/coursework\/cyse-200t-cybersecurity-technology-society\/scada-systems-write-up\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":31334,"featured_media":0,"parent":214,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/asherembry\/wp-json\/wp\/v2\/pages\/226"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/asherembry\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/asherembry\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/asherembry\/wp-json\/wp\/v2\/users\/31334"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/asherembry\/wp-json\/wp\/v2\/comments?post=226"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/asherembry\/wp-json\/wp\/v2\/pages\/226\/revisions"}],"predecessor-version":[{"id":228,"href":"https:\/\/sites.wp.odu.edu\/asherembry\/wp-json\/wp\/v2\/pages\/226\/revisions\/228"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/asherembry\/wp-json\/wp\/v2\/pages\/214"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/asherembry\/wp-json\/wp\/v2\/media?parent=226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}