{"id":295,"date":"2023-12-08T02:38:20","date_gmt":"2023-12-08T02:38:20","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cpolansky\/?p=295"},"modified":"2023-12-08T02:38:20","modified_gmt":"2023-12-08T02:38:20","slug":"scada-systems-and-vulnerable-critical-infrastructure","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cpolansky\/2023\/12\/08\/scada-systems-and-vulnerable-critical-infrastructure\/","title":{"rendered":"SCADA Systems and Vulnerable Critical Infrastructure"},"content":{"rendered":"\n<p><em>In this paper I will talk about what SCADA means and is, the Vulnerabilities associated with Critical Infrastructure, and how SCADA can reduce those risks<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><em>What is SCADA<\/em><\/h2>\n\n\n\n<p>SCADA, which means \u201cSupervisory Control And Data Acquisition\u201d refers to systems that control infrastructure, facility, and industrial processes (SCADA systems). It allows organizations to monitor data in real time. It also allows them to interact with devices via Human Machine Interface\u2019s (HMI). HMI\u2019s display their information in a graphical format, showing the user a representation of the facility the user is controlling.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Vulnerabilities in Critical Infrastructure Systems<\/h2>\n\n\n\n<p>Critical Infrastructure is the infrastructure that keeps the country running, such as Power Plants, Water Supply, and Emergency Service systems. If these any of these infrastructures that are deemed \u201ccritical\u201d were taken down it would have a dramatic effect on the country, essentially shutting our country down (Wright, 2023). The US Government states that there are sixteen different types of Critical Infrastructure, which includes Chemical, Commercial Facilities, Communications, Critical Manufacturing, Dams, The Defense Industrial Base, Emergency Services, Energy, Financial Services, Food and Agriculture, Government Facilities, Healthcare and Public Health, Information Technology, Nuclear Reactors, Materials, and Waste, Transportation, and Water and Wastewater (<em>Critical Infrastructure Sectors: CISA<\/em>). The United States\u2019 critical infrastructure is increasingly vulnerable these days. As we continue to rely more and more on internet connected systems to run our Critical Infrastructure, we run the risk of a cyber-attack taking down sections, or even potentially the entirety, of our critical infrastructure (Labus, 2022).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Roles SCADA plays in reducing risks<\/h2>\n\n\n\n<p>SCADA itself is rather vulnerable to outside attacks, such as the Stuxnet worm, which is the most famous attack on a SCADA system. There are several ways to mitigate these vulnerabilities, which help protect the systems that SCADA is in charge of. These range from simply keeping your systems up to date with the latest patches and updates, using endpoint protection to protect against outside threats, managing authorization for user accounts for those that have access to the system and maintain policies on what is and isn\u2019t allowed to connect to the SCADA network (<em>One flaw too many: Vulnerabilities in SCADA systems<\/em>).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>In conclusion I talked about what SCADA means, Supervisory Control And Data Acquisition, and it is: a system that control infrastructure, facility, and industrial processes. I further talked about the vulnerabilities associated with Critical Infrastructure, and how SCADA can reduce those risks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">References<\/h2>\n\n\n\n<ul>\n<li><em>Critical Infrastructure Sectors: CISA<\/em>. Cybersecurity and Infrastructure Security Agency CISA. (n.d.). https:\/\/www.cisa.gov\/topics\/critical-infrastructure-security-and-resilience\/critical-infrastructure-sectors<\/li>\n\n\n\n<li>Labus, H. (2022, March 11). <em>The massive impact of vulnerabilities in critical infrastructure<\/em>. Help Net Security. https:\/\/www.helpnetsecurity.com\/2022\/03\/15\/critical-infrastructure-security\/<\/li>\n\n\n\n<li><em>One flaw too many: Vulnerabilities in SCADA systems<\/em>. Security News. (n.d.). https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/vulnerabilities-and-exploits\/one-flaw-too-many-vulnerabilities-in-scada-systems<\/li>\n\n\n\n<li><em>SCADA systems<\/em>. SCADA Systems. (n.d.). https:\/\/www.scadasystems.net\/<\/li>\n\n\n\n<li>Wright, G. (2023, August 29). <em>What is critical infrastructure?: Definition from TechTarget<\/em>. WhatIs.com. https:\/\/www.techtarget.com\/whatis\/definition\/critical-infrastructure<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>In this paper I will talk about what SCADA means and is, the Vulnerabilities associated with Critical Infrastructure, and how SCADA can reduce those risks What is SCADA SCADA, which means \u201cSupervisory Control And Data Acquisition\u201d refers to systems that control infrastructure, facility, and industrial processes (SCADA systems). It allows organizations to monitor data in&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cpolansky\/2023\/12\/08\/scada-systems-and-vulnerable-critical-infrastructure\/\">Read More<\/a><\/div>\n","protected":false},"author":27586,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cpolansky\/wp-json\/wp\/v2\/posts\/295"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cpolansky\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cpolansky\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cpolansky\/wp-json\/wp\/v2\/users\/27586"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cpolansky\/wp-json\/wp\/v2\/comments?post=295"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cpolansky\/wp-json\/wp\/v2\/posts\/295\/revisions"}],"predecessor-version":[{"id":296,"href":"https:\/\/sites.wp.odu.edu\/cpolansky\/wp-json\/wp\/v2\/posts\/295\/revisions\/296"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cpolansky\/wp-json\/wp\/v2\/media?parent=295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cpolansky\/wp-json\/wp\/v2\/categories?post=295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cpolansky\/wp-json\/wp\/v2\/tags?post=295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}