CYSE 200T


Using SCADA to Protect Critical Infrastructure and Systems


SCADA systems are essential for protecting critical infrastructure because they
provide real‑time monitoring, automated control, and rapid detection of abnormal
conditions, but their increasing connectivity also introduces significant cybersecurity
vulnerabilities that organizations must address through stronger security controls and
modernized architectures.
Critical infrastructure systems rely on continuous, stable operations, and SCADA
systems provide the centralized oversight needed to maintain that stability. SCADA
integrates components such as Remote Terminal Units (RTUs), Programmable Logic
Controllers (PLCs), communication networks, and Human‑Machine Interfaces (HMIs) to
monitor and coordinate industrial processes. The uploaded article explains that RTUs
“convert all electrical signals coming from the equipment into digital values” and can
even “control the equipment, like closing or opening a valve or a switch.” This real‑time
visibility allows operators to detect abnormal conditions early, make informed decisions,
and prevent disruptions that could affect essential services like water treatment, power
distribution, and transportation.
Regardless of their operational value, SCADA systems introduce significant
cybersecurity risks due to their connectivity and reliance on legacy protocols. The article
identifies two major threats: unauthorized access to control software and unauthorized
packet access to network segments hosting SCADA devices. Because many SCADA
protocols lack built-in security, “any person sending packets to a SCADA device is in a
position to control it,” making these systems attractive targets for cyberattacks. This risk
is heightened by the misconception that physical isolation or VPN use alone provides
adequate protection. In reality, modern SCADA environments are often connected to
broader networks, increasing exposure to malware, intrusion attempts, and remote
exploitation.
These vulnerabilities are not hypothetical. The Cybersecurity and Infrastructure
Security Agency (CISA) reports a steady rise in attacks targeting industrial control
systems, driven by adversaries seeking to disrupt critical services or gain a strategic
advantage. CISA highlights outdated protocols, weak authentication, and insufficient
network segmentation as common weaknesses across industrial environments. At the
same time, SCADA systems offer built-in mitigation tools such as alarm functions,
redundancy, and centralized monitoring. The article notes that “multiple servers are
occasionally configured in hot‑standby or dual‑redundant formation, ensuring continuous
operation even during failures. Vendors are also integrating stronger security features,
including industrial firewalls, whitelisting, and secure VPNs designed specifically for
SCADA networks.
Conclusion
SCADA systems are foundational to the operation and protection of critical
infrastructure, providing the automation, monitoring, and responsiveness required to
manage complex physical processes. However, their increasing connectivity exposes
them to evolving cyber threats that cannot be ignored. The SCADA article makes clear
that legacy protocols, insecure network configurations, and misconceptions about
system isolation continue to create significant vulnerabilities. At the same time,
SCADA’s alarm capabilities, redundancy features, and modern security enhancements
offer powerful tools for mitigating these risks. Strengthening SCADA security is essential
for ensuring the reliability, safety, and resilience of the systems that support modern
society.
Works Cited
SCADA Systems. Using SCADA to Protect Critical Infrastructure and Systems. PDF
Cybersecurity and Infrastructure Security Agency. “Industrial Control Systems Security.”
CISA, 2024,
https://www.cisa.gov/topics/industrial-control-systems

DISCUSSION BOARD: Protecting Availability

As the CISO of a publicly traded company, my main focus for availability would be building layers of protection that keep our systems running even when something goes wrong. A few key steps I’d put in place are redundant systems and failover options to make sure all critical services have backups. Continuous monitoring because real‑time monitoring tools are essential. They help us catch performance issues, unusual traffic, or early signs of an attack before they turn into downtime. DDoS protection would be next, since DDoS attacks are one of the biggest threats to availability. I’d use network‑level filtering, rate limiting, and a DDoS mitigation service to absorb or block malicious traffic. A strong backup and disaster recovery plan is a must.  Regular, tested backups ensure we can restore systems quickly. I’d also run scheduled disaster‑recovery drills, so the team knows exactly how to respond. Patch management and system hardening would be the last thing I’d add. Unpatched systems can crash or be exploited. Keeping everything updated and removing unnecessary services reduces the chance of outages. Overall, availability comes from preparation, visibility, and resilience. The goal is to make sure that even if something fails, the business keeps running smoothly.

Discussion Board: Ethical Considerations of CRISPR Gene Editing
CRISPR gene editing raises major ethical concerns because it sits at the intersection of biology, technology, and cybersecurity. One of the biggest issues is the vulnerability of genomic data itself. The NIST report explains that genomic data is “largely immutable, associative, and conveys important health, phenotype, and personal information about individuals and their kin” (NIST IR 8432). Because DNA cannot be changed like a password, any breach could permanently expose a person’s identity, health risks, and even their relatives’ information. This makes the use of CRISPR especially sensitive, since editing DNA requires collecting and storing large amounts of genomic data.
Another concern is the possibility of misuse. The NIST report warns that cyberattacks on genomic data could enable “development of biological weapons and surveillance, oppression, and extortion” (NIST IR 8432). The Forbes article reinforces this risk, noting that DNA is the “ultimate PII” because it is permanent and highly valuable to hackers. If CRISPR data were stolen or altered, it could lead to discrimination, exploitation, or unauthorized genetic modification.
Finally, there is the question of consent and control. Individuals may not fully understand how their DNA is stored, shared, or protected. As the Forbes article points out, once DNA is digitized, “its usage is somewhat unknown to us.” This raises concerns about whether people can truly give informed consent when the long‑term risks are still emerging.
Overall, CRISPR offers enormous medical benefits, but it also demands strict cybersecurity protections, transparent data practices, and strong ethical guidelines to prevent misuse and protect individuals’ genetic privacy.