{"id":323,"date":"2026-03-02T16:14:47","date_gmt":"2026-03-02T16:14:47","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/carmackdeonta\/?page_id=323"},"modified":"2026-05-03T22:50:40","modified_gmt":"2026-05-03T22:50:40","slug":"cyse-200t","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/carmackdeonta\/cyse-200t\/","title":{"rendered":"CYSE 200T"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p><br>                            Using SCADA to Protect Critical Infrastructure and Systems<\/p>\n\n\n\n<p><br>SCADA systems are essential for protecting critical infrastructure because they<br>provide real\u2011time monitoring, automated control, and rapid detection of abnormal<br>conditions, but their increasing connectivity also introduces significant cybersecurity<br>vulnerabilities that organizations must address through stronger security controls and<br>modernized architectures.<br>Critical infrastructure systems rely on continuous, stable operations, and SCADA<br>systems provide the centralized oversight needed to maintain that stability. SCADA<br>integrates components such as Remote Terminal Units (RTUs), Programmable Logic<br>Controllers (PLCs), communication networks, and Human\u2011Machine Interfaces (HMIs) to<br>monitor and coordinate industrial processes. The uploaded article explains that RTUs<br>\u201cconvert all electrical signals coming from the equipment into digital values\u201d and can<br>even \u201ccontrol the equipment, like closing or opening a valve or a switch.\u201d This real\u2011time<br>visibility allows operators to detect abnormal conditions early, make informed decisions,<br>and prevent disruptions that could affect essential services like water treatment, power<br>distribution, and transportation.<br>Regardless of their operational value, SCADA systems introduce significant<br>cybersecurity risks due to their connectivity and reliance on legacy protocols. The article<br>identifies two major threats: unauthorized access to control software and unauthorized<br>packet access to network segments hosting SCADA devices. Because many SCADA<br>protocols lack built-in security, \u201cany person sending packets to a SCADA device is in a<br>position to control it,\u201d making these systems attractive targets for cyberattacks. This risk<br>is heightened by the misconception that physical isolation or VPN use alone provides<br>adequate protection. In reality, modern SCADA environments are often connected to<br>broader networks, increasing exposure to malware, intrusion attempts, and remote<br>exploitation.<br>These vulnerabilities are not hypothetical. The Cybersecurity and Infrastructure<br>Security Agency (CISA) reports a steady rise in attacks targeting industrial control<br>systems, driven by adversaries seeking to disrupt critical services or gain a strategic<br>advantage. CISA highlights outdated protocols, weak authentication, and insufficient<br>network segmentation as common weaknesses across industrial environments. At the<br>same time, SCADA systems offer built-in mitigation tools such as alarm functions,<br>redundancy, and centralized monitoring. The article notes that \u201cmultiple servers are<br>occasionally configured in hot\u2011standby or dual\u2011redundant formation, ensuring continuous<br>operation even during failures. Vendors are also integrating stronger security features,<br>including industrial firewalls, whitelisting, and secure VPNs designed specifically for<br>SCADA networks.<br>Conclusion<br>SCADA systems are foundational to the operation and protection of critical<br>infrastructure, providing the automation, monitoring, and responsiveness required to<br>manage complex physical processes. However, their increasing connectivity exposes<br>them to evolving cyber threats that cannot be ignored. The SCADA article makes clear<br>that legacy protocols, insecure network configurations, and misconceptions about<br>system isolation continue to create significant vulnerabilities. At the same time,<br>SCADA\u2019s alarm capabilities, redundancy features, and modern security enhancements<br>offer powerful tools for mitigating these risks. Strengthening SCADA security is essential<br>for ensuring the reliability, safety, and resilience of the systems that support modern<br>society.<br>Works Cited<br>SCADA Systems. Using SCADA to Protect Critical Infrastructure and Systems. PDF<br>Cybersecurity and Infrastructure Security Agency. \u201cIndustrial Control Systems Security.\u201d<br>CISA, 2024,<br>https:\/\/www.cisa.gov\/topics\/industrial-control-systems<\/p>\n\n\n\n<p>DISCUSSION BOARD: Protecting Availability <\/p>\n\n\n\n<p>As the CISO of a publicly traded company, my main focus for availability would be building layers of protection that keep our systems running even when something goes wrong. A few key steps I\u2019d put in place are redundant systems and failover options to make sure all critical services have backups. Continuous monitoring because real\u2011time monitoring tools are essential. They help us catch performance issues, unusual traffic, or early signs of an attack before they turn into downtime. DDoS protection would be next, since DDoS attacks are one of the biggest threats to availability. I&#8217;d use network\u2011level filtering, rate limiting, and a DDoS mitigation service to absorb or block malicious traffic. A strong backup and disaster recovery plan is a must. &nbsp;Regular, tested backups ensure we can restore systems quickly. I\u2019d also run scheduled disaster\u2011recovery drills, so the team knows exactly how to respond. Patch management and system hardening would be the last thing I\u2019d add. Unpatched systems can crash or be exploited. Keeping everything updated and removing unnecessary services reduces the chance of outages. Overall, availability comes from preparation, visibility, and resilience. The goal is to make sure that even if something fails, the business keeps running smoothly.<\/p>\n\n\n\n<p>Discussion Board: Ethical Considerations of CRISPR Gene Editing<br>CRISPR gene editing raises major ethical concerns because it sits at the intersection of biology, technology, and cybersecurity. One of the biggest issues is the vulnerability of genomic data itself. The NIST report explains that genomic data is \u201clargely immutable, associative, and conveys important health, phenotype, and personal information about individuals and their kin\u201d (NIST IR 8432). Because DNA cannot be changed like a password, any breach could permanently expose a person\u2019s identity, health risks, and even their relatives\u2019 information. This makes the use of CRISPR especially sensitive, since editing DNA requires collecting and storing large amounts of genomic data.<br>Another concern is the possibility of misuse. The NIST report warns that cyberattacks on genomic data could enable \u201cdevelopment of biological weapons and surveillance, oppression, and extortion\u201d (NIST IR 8432). The Forbes article reinforces this risk, noting that DNA is the \u201cultimate PII\u201d because it is permanent and highly valuable to hackers. If CRISPR data were stolen or altered, it could lead to discrimination, exploitation, or unauthorized genetic modification.<br>Finally, there is the question of consent and control. Individuals may not fully understand how their DNA is stored, shared, or protected. As the Forbes article points out, once DNA is digitized, \u201cits usage is somewhat unknown to us.\u201d This raises concerns about whether people can truly give informed consent when the long\u2011term risks are still emerging.<br>Overall, CRISPR offers enormous medical benefits, but it also demands strict cybersecurity protections, transparent data practices, and strong ethical guidelines to prevent misuse and protect individuals\u2019 genetic privacy.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Using SCADA to Protect Critical Infrastructure and Systems SCADA systems are essential for protecting critical infrastructure because theyprovide real\u2011time monitoring, automated control, and rapid detection of abnormalconditions, but their increasing connectivity also introduces significant cybersecurityvulnerabilities that organizations must address through stronger security controls andmodernized architectures.Critical infrastructure systems rely on continuous, stable operations, and SCADAsystems provide&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/carmackdeonta\/cyse-200t\/\">Read More<\/a><\/div>\n","protected":false},"author":31917,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/carmackdeonta\/wp-json\/wp\/v2\/pages\/323"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/carmackdeonta\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/carmackdeonta\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/carmackdeonta\/wp-json\/wp\/v2\/users\/31917"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/carmackdeonta\/wp-json\/wp\/v2\/comments?post=323"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/carmackdeonta\/wp-json\/wp\/v2\/pages\/323\/revisions"}],"predecessor-version":[{"id":331,"href":"https:\/\/sites.wp.odu.edu\/carmackdeonta\/wp-json\/wp\/v2\/pages\/323\/revisions\/331"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/carmackdeonta\/wp-json\/wp\/v2\/media?parent=323"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}