{"id":292,"date":"2025-12-02T03:29:15","date_gmt":"2025-12-02T03:29:15","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/austinharendt\/?p=292"},"modified":"2025-12-02T03:29:15","modified_gmt":"2025-12-02T03:29:15","slug":"scada-systems","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/austinharendt\/2025\/12\/02\/scada-systems\/","title":{"rendered":"SCADA Systems"},"content":{"rendered":"\n<p><strong>BLUF:<\/strong><br>Many industrial systems are susceptible to attacks but SCADA systems help mitigate attacks<br>such as human overrides, data infiltration, and preventing downtime for these systems. This<br>shows how crucial SCADA systems are in the world of cybersecurity.<br>An industrial system can be attacked by cybercriminals, causing many issues for the<br>organization in use of this system. SCADA systems prevent unauthorized users from entering<br>these networks, helping them run smoothly without disturbances. According to<br>, \u201cSCADA protocols have been designed to be extremely compactSCADA Systems.docx<br>and to send information to the master station only when the RTU is polled by the master<br>station.\u201d This shows that it makes it extremely difficult to attack infrastructures that are secured<br>by a SCADA system.<br>Data infiltration is a big threat that can corrupt the information before it is sent to the<br>correct station. According to<br><a href=\"https:\/\/www.legitsecurity.com\/aspm-knowledge-base\/scada-systems-security\">https:\/\/www.legitsecurity.com\/aspm-knowledge-base\/scada-systems-security<\/a>, \u201cThe information<br>that sensors collect feeds into analytic platforms that evaluate system health and efficiency.\u201d<br>Meaning that if the data that is collected by the SCADA system is tampered with and sent to the<br>master station then it could be critical to the operation, and could cause an outage and reduce<br>its health.<br>Downtimes and outages for industrial services can cause chaos throughout many parts<br>of the world, depending on the type of system that is down. Preventing outages is a big part of<br>the role of SCADA systems, as it provides system security against different attacks. This in all<br>ensures stability for the system and a secure network for it to run on.<br><strong>Conclusion:<\/strong><br>While SCADA systems may not be perfect, they offer great security against cybercriminals, data<br>corruption, and outages. Without them, many industrial systems would be subject to mass<br>cybercrime.<a href=\"https:\/\/docs.google.com\/document\/d\/1VnMlL2YmcW5Jg4MdDa1dt5fJpmQM0KVH\/edit?usp=sharing&amp;ouid=116364106782150649703&amp;rtpof=true&amp;sd=true\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>BLUF:Many industrial systems are susceptible to attacks but SCADA systems help mitigate attackssuch as human overrides, data infiltration, and preventing downtime for these systems. Thisshows how crucial SCADA systems are in the world of cybersecurity.An industrial system can be attacked by cybercriminals, causing many issues for theorganization in use of this system. SCADA systems prevent&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/austinharendt\/2025\/12\/02\/scada-systems\/\">Read More<\/a><\/div>\n","protected":false},"author":31627,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/austinharendt\/wp-json\/wp\/v2\/posts\/292"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/austinharendt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/austinharendt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/austinharendt\/wp-json\/wp\/v2\/users\/31627"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/austinharendt\/wp-json\/wp\/v2\/comments?post=292"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/austinharendt\/wp-json\/wp\/v2\/posts\/292\/revisions"}],"predecessor-version":[{"id":293,"href":"https:\/\/sites.wp.odu.edu\/austinharendt\/wp-json\/wp\/v2\/posts\/292\/revisions\/293"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/austinharendt\/wp-json\/wp\/v2\/media?parent=292"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/austinharendt\/wp-json\/wp\/v2\/categories?post=292"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/austinharendt\/wp-json\/wp\/v2\/tags?post=292"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}