{"id":440,"date":"2025-12-06T20:34:07","date_gmt":"2025-12-06T20:34:07","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ayomideadewaleadebowale\/?p=440"},"modified":"2025-12-06T20:34:07","modified_gmt":"2025-12-06T20:34:07","slug":"scada-system-vulnerabilities-and-mitigating-risks","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/ayomideadewaleadebowale\/2025\/12\/06\/scada-system-vulnerabilities-and-mitigating-risks\/","title":{"rendered":"SCADA System: Vulnerabilities and Mitigating Risks"},"content":{"rendered":"\n<p style=\"font-size:16px\">SCADA (Supervisory Control and Data Acquisition Systems) is an industrial control<br>system used to control infrastructure processes such as water treatment, power grids, gas<br>pipelines, airports, etc. Critical infrastructures face various vulnerabilities, such as Ransom<br>attacks on OT systems, physical attacks, supply chain attacks, and Legacy systems. (Cherian,<br>2025). Ransom attacks on OT systems involve encrypted files that disrupt physical industrial<br>processes, holding operations hostage until a ransom is paid. Physical attacks with cyber<br>motives: This method of attack is used to cause physical damage to systems and infrastructure.<br>Supply chain attacks: In these attacks, the attacker targets a company&#8217;s third-party vendors or<br>providers, such as software Developers and hardware manufacturers, to infiltrate a Target<br>organization&#8217;s Network and spread malware or gain access to sensitive data.(Lenaerts-Bergmans, 2023, p. 1). Legacy systems: hackers exploit outdated Hardware, software, and poor network segmentation, making them easy targets. (Cherian, 2025) .<\/p>\n\n\n\n<p style=\"font-size:16px\"><br>SCADA applications mitigate these risks through real-time monitoring and automated<br>responses, enabling continuous monitoring of critical parameters and allowing adjustments and maintenance of every asset across the SCADA system. Segment Networks: The use of Network segmentation to create smaller subnets within the SCADA system. It helps enforce specialized access and isolate sensitive data, also adding layers of firewall and OT security checkpoints. (Security, 2025).<\/p>\n\n\n\n<p style=\"font-size:16px\"><br>In conclusion, SCADA systems play a significant role in protecting critical<br>infrastructures from vulnerabilities. These vulnerabilities can lead to physical damage, public<\/p>\n\n\n\n<p style=\"font-size:16px\">safety, economic damage, National Security risks, and disruption to essential services. The role<br>of SCADA applications in mitigating these risks is to protect critical infrastructure.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p style=\"font-size:16px\">Resources<br>(2025, July 28). Top Critical Infrastructure Threats in 2025. Micromindercs.com.<br>https:\/\/www.micromindercs.com\/blog\/critical-infrastructure-threats<br>(2023, September 26). What Is a Supply Chain Attack? Crowdstrike.com.<br>https:\/\/www.crowdstrike.com\/en-us\/cybersecurity-101\/cyberattacks\/supply-chain-attack\/#:~:text=Examples%20of%20supply%20chain%20attacks,tools%20and%20services%20available%20today.<br>(2025, September 16). SCADA Systems Security: Protecting Infrastructure From Risks.<br>Legitsecurity.com.https:\/\/www.crowdstrike.com\/en-us\/cybersecurity-101\/cyberattacks\/supply-chainattack\/#:~:text=Examples%20of%20supply%20chain%20attacks,tools%20and%20services%20available%20today.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>SCADA (Supervisory Control and Data Acquisition Systems) is an industrial controlsystem used to control infrastructure processes such as water treatment, power grids, gaspipelines, airports, etc. Critical infrastructures face various vulnerabilities, such as Ransomattacks on OT systems, physical attacks, supply chain attacks, and Legacy systems. (Cherian,2025). Ransom attacks on OT systems involve encrypted files that disrupt &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/ayomideadewaleadebowale\/2025\/12\/06\/scada-system-vulnerabilities-and-mitigating-risks\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">SCADA System: Vulnerabilities and Mitigating Risks<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":31393,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ayomideadewaleadebowale\/wp-json\/wp\/v2\/posts\/440"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ayomideadewaleadebowale\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ayomideadewaleadebowale\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ayomideadewaleadebowale\/wp-json\/wp\/v2\/users\/31393"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ayomideadewaleadebowale\/wp-json\/wp\/v2\/comments?post=440"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/ayomideadewaleadebowale\/wp-json\/wp\/v2\/posts\/440\/revisions"}],"predecessor-version":[{"id":441,"href":"https:\/\/sites.wp.odu.edu\/ayomideadewaleadebowale\/wp-json\/wp\/v2\/posts\/440\/revisions\/441"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ayomideadewaleadebowale\/wp-json\/wp\/v2\/media?parent=440"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ayomideadewaleadebowale\/wp-json\/wp\/v2\/categories?post=440"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ayomideadewaleadebowale\/wp-json\/wp\/v2\/tags?post=440"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}