{"id":295,"date":"2025-12-07T22:04:39","date_gmt":"2025-12-07T22:04:39","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/chancebelcher\/?p=295"},"modified":"2025-12-07T22:04:39","modified_gmt":"2025-12-07T22:04:39","slug":"scada-systems-and-their-importance","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/chancebelcher\/2025\/12\/07\/scada-systems-and-their-importance\/","title":{"rendered":"SCADA Systems and Their Importance"},"content":{"rendered":"\n<p class=\"has-text-align-center\">Written by Chance Belcher<br><em>Critical Infrastructure Systems depend on network-controlled environments. This leads to<br>many weaknesses, which the implementation of SCADA Systems will address. Issues such as<br>insecure RTUs and PLCs, as well as malware infections and host system compromise, are all<br>solved with SCADA.<\/em><br><\/p>\n\n\n\n<p class=\"has-text-align-center\">Critical Infrastructures Vulnerabilities<br>Modern critical infrastructure systems typically use IP-based networks and WAN<br>connections. While this does make operations streamlined and allows for easier access for<br>employees, it also comes with its own list of issues. Having the network on a WAN, or any<br>IP-based network, creates opportunities for threat vectors to remotely attack our systems. Older<br>generations of critical infrastructure systems utilize proprietary protocols that have limited<br>security; even newer systems tend to still use protocols that lack strong authentication or<br>encryption. Finally, RTUs (remote terminal units) and PLCs (programmable logic controller)<br>often allow commands without rigorous validation. If someone gains network access through<br>these means, they will be able to tamper with real-world equipment such as pumps, valves, etc.<br><\/p>\n\n\n\n<p class=\"has-text-align-center\">How SCADA Applications help Mitigate these Risks<br>SCADA applications play an essential role in safeguarding critical processes and<br>improving employee resilience by providing better tools that improve visibility and control.<br>SCADA provides centralized monitoring and real-time awareness. It consolidates data from<br>RTUs or PLCs, providing employees with alarms, status updates, and historical logs, which can<br>be used to secure the network. Early detection of abnormal activity can help us prevent any<br>breaches in the future. Even though RTUs\/PLCs perform most actions automatically, SCADA<br>allows us to have operators who can override unsafe conditions, adjust setpoints, and respond<br>swiftly to unexpected events. SCADA systems also often include dual-redundant or hot-standby<br>servers. If primary functions go down, whether due to a threat vector or malfunction, a backup<br>server is in place to keep operations running.<br><\/p>\n\n\n\n<p class=\"has-text-align-center\">Summary<br>In conclusion, vulnerabilities within critical infrastructure systems mainly derive from<br>connectivity, weak\/legacy protocols, insecure field devices, and malware\/unauthorized access.<br>SCADA applications mitigate risks by centralizing monitoring capabilities, providing<br>supervisory control, triggering alarms, and integrating security controls like VPNs and<br>whitelisting. We should implement SCADA systems in our company.<br><\/p>\n\n\n\n<p class=\"has-text-align-center\">Works Cited<br>IEEE. (2025). Cybersecurity of critical infrastructure with ICS\/SCADA systems. IEEE Public Safety<br>Technology.<br>https:\/\/publicsafety.ieee.org\/topics\/cybersecurity-of-critical-infrastructure-with-ics-scada-systems<br>\/<br>SCADA Systems. (n.d.). SCADA systems. http:\/\/www.scadasystems.net<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Written by Chance BelcherCritical Infrastructure Systems depend on network-controlled environments. This leads tomany weaknesses, which the implementation of SCADA Systems will address. Issues such asinsecure RTUs and PLCs, as well as malware infections and host system compromise, are allsolved with SCADA. Critical Infrastructures VulnerabilitiesModern critical infrastructure systems typically use IP-based networks and WANconnections. While this&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/chancebelcher\/2025\/12\/07\/scada-systems-and-their-importance\/\">Read More<\/a><\/div>\n","protected":false},"author":31625,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/chancebelcher\/wp-json\/wp\/v2\/posts\/295"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/chancebelcher\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/chancebelcher\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/chancebelcher\/wp-json\/wp\/v2\/users\/31625"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/chancebelcher\/wp-json\/wp\/v2\/comments?post=295"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/chancebelcher\/wp-json\/wp\/v2\/posts\/295\/revisions"}],"predecessor-version":[{"id":296,"href":"https:\/\/sites.wp.odu.edu\/chancebelcher\/wp-json\/wp\/v2\/posts\/295\/revisions\/296"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/chancebelcher\/wp-json\/wp\/v2\/media?parent=295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/chancebelcher\/wp-json\/wp\/v2\/categories?post=295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/chancebelcher\/wp-json\/wp\/v2\/tags?post=295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}