{"id":316,"date":"2025-12-04T02:32:59","date_gmt":"2025-12-04T02:32:59","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/chaselawson-cyse200\/?page_id=316"},"modified":"2025-12-04T02:39:29","modified_gmt":"2025-12-04T02:39:29","slug":"free-write-up-two","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/chaselawson-cyse200\/free-write-up-two\/","title":{"rendered":"SCADA Systems"},"content":{"rendered":"\n<p>Chase Lawson<\/p>\n\n\n\n<p>CYSE200T<\/p>\n\n\n\n<p>10\/11\/2025<\/p>\n\n\n\n<p>SCADA Systems<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SCADA refers to the industrial control system.&nbsp; This is the program that is used to control water and sewer pipelines.&nbsp; SCADA controls traffic lights and windfarms.&nbsp; SCADA has very low security because they aren\u2019t connected to the internet and are physically secure, so there is a na\u00efve belief that they are safe.&nbsp; SCADA, much like any other system that is connected to a network, can be vulnerable in many ways and can be a potential target for a cyber-attack.&nbsp; One reason that SCADA becomes vulnerable is inadequate authentication mechanisms.&nbsp; SCADA systems were designed for isolated environments so there was no need for authentication credentials.&nbsp; Another vulnerability is that SCADA systems often employ proprietary communication protocols that lack encryption.&nbsp; Not having any kind of encryption can be detrimental to the software, which in turn would be extremely bad if it became compromised.&nbsp; Vulnerabilities can become a real problem for some companies, especially if the equipment they are using isn\u2019t receiving or cannot receive regular updates due to the terminals being legacy terminals.&nbsp; Legacy terminals are referred to terminals that can no longer receive security patches due to the firmware that can no longer be updated.&nbsp; Since they are legacy computers and can no longer receive security patches that makes them very susceptible to a cyber-attack.&nbsp; There are a few ways to combat these potential attacks.&nbsp; Enable authentication and enforce multifactor authentication.&nbsp; Install and implement VPNs.&nbsp; Apply end-to-end encryption.&nbsp; Establish a patch management process.&nbsp; The SCADA system seems safe because it appears disconnected to the rest of the world, but this is something that dramatically needs to be protected.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/gca.isa.org\/blog\/9-scada-system-vulnerabilities-and-how-to-secure-them\">https:\/\/gca.isa.org\/blog\/9-scada-system-vulnerabilities-and-how-to-secure-them<\/a> Zac Amos<\/p>\n\n\n\n<p>http:\/\/www.scadasystems.net<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Chase Lawson CYSE200T 10\/11\/2025 SCADA Systems &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SCADA refers to the industrial control system.&nbsp; This is the program that is used to control water and sewer pipelines.&nbsp; SCADA controls traffic lights and windfarms.&nbsp; SCADA has very low security because they aren\u2019t connected to the internet and are physically secure, so there is a na\u00efve belief &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/chaselawson-cyse200\/free-write-up-two\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">SCADA Systems<\/span><\/a><\/p>\n","protected":false},"author":31284,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/chaselawson-cyse200\/wp-json\/wp\/v2\/pages\/316"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/chaselawson-cyse200\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/chaselawson-cyse200\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/chaselawson-cyse200\/wp-json\/wp\/v2\/users\/31284"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/chaselawson-cyse200\/wp-json\/wp\/v2\/comments?post=316"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/chaselawson-cyse200\/wp-json\/wp\/v2\/pages\/316\/revisions"}],"predecessor-version":[{"id":327,"href":"https:\/\/sites.wp.odu.edu\/chaselawson-cyse200\/wp-json\/wp\/v2\/pages\/316\/revisions\/327"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/chaselawson-cyse200\/wp-json\/wp\/v2\/media?parent=316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}