{"id":187,"date":"2024-11-18T04:23:22","date_gmt":"2024-11-18T04:23:22","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse200t-dsasa001\/?p=187"},"modified":"2024-11-18T04:23:22","modified_gmt":"2024-11-18T04:23:22","slug":"write-up-scada-systems","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cyse200t-dsasa001\/2024\/11\/18\/write-up-scada-systems\/","title":{"rendered":"Write-Up &#8211; SCADA Systems"},"content":{"rendered":"\n<p>Dante Sasaki<\/p>\n\n\n\n<p><br>SCADA\u2019s Role in Risk Mitigation<\/p>\n\n\n\n<p><br>SCADA Systems and how they benefit society<br>SCADA Systems are also known as Supervisory Control and Data Acquisition Systems.<br>SCADA is required in society because their role is to monitor and control infrastructures<br>like power grids, water treatment facilities, and transportation networks. Based on all of<br>these things that SCADA helps to monitor, they are absolutely crucial for infrastructure<br>and can cause bigger problems if people exploit their systems. They are vulnerable to<br>physical and cyber threats.<br>Source: http:\/\/www.scadasystems.net<\/p>\n\n\n\n<p><br>Critical Infrastructure Systems Vulnerabilities<br>There are physical threats and there are cyber threats. Physical threats are either<br>caused by natural disasters, equipment failure, human error, or sabotage. There is not<br>much room for growth in the physical threats but as technology advances there are a<br>ton more cyber threats that come with it. Cyber threats are unauthorized access,<br>outdated systems, interconnected networks, ineffective security measures, and lack of<br>encryption. Since technology is always advancing these systems often try to go towards<br>network isolation to control traffic flow. All of these vulnerabilities can be exploited<br>because systems not being up to date means there hasn\u2019t been any patches to the<br>systems and people can continue having unauthorized access. Since technology is well<br>understood and targeted by attackers\/hackers, TCP\/IP and ethernet do not contribute<br>towards the weaknesses that these systems still currently have.<br>Source:https:\/\/www.cyberintelinsights.com.<\/p>\n\n\n\n<p><br>How SCADA Applications Will Mitigate These Risks<br>SCADA Systems are absolutely needed for critical infrastructures because they allow<br>for them to monitor and control these systems. A few of the ways that they mitigate<br>these risks is by Human Machine Interface(HMI), supervisory stations, Remote Terminal<br>Units(RTU), and communication infrastructures. HMI gathers and exchanges data<br>continuously and \u201cThe data collected by SCADA systems allows operators to make<br>informed decisions and ensure the efficient and safe operation of critical infrastructure.\u201d<br>So that they can secure these SCADA systems they also have supervisory stations<br>which helps secure their systems for unauthorized access. RTU allows for the system to have efficient monitoring, control, and data acquisition in a remote location. These are<br>all great ways that SCADA systems play a vital role in mitigating risks towards critical<br>infrastructures and the people that try to currently hack into them.<br>Source:https:\/\/www.cyberintelinsights.com.<\/p>\n\n\n\n<p><br>Conclusion<br>In conclusion, SCADA Systems are crucial for critical infrastructure to stay functioning<br>so that they have efficient monitoring and have control over their services like power,<br>water, and transportation. By constantly advancing with technology they can maintain or<br>even have better security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dante Sasaki SCADA\u2019s Role in Risk Mitigation SCADA Systems and how they benefit societySCADA Systems are also known as Supervisory Control and Data Acquisition Systems.SCADA is required in society because their role is to monitor and control infrastructureslike power grids,&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyse200t-dsasa001\/2024\/11\/18\/write-up-scada-systems\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":29737,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse200t-dsasa001\/wp-json\/wp\/v2\/posts\/187"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse200t-dsasa001\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse200t-dsasa001\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse200t-dsasa001\/wp-json\/wp\/v2\/users\/29737"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse200t-dsasa001\/wp-json\/wp\/v2\/comments?post=187"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cyse200t-dsasa001\/wp-json\/wp\/v2\/posts\/187\/revisions"}],"predecessor-version":[{"id":188,"href":"https:\/\/sites.wp.odu.edu\/cyse200t-dsasa001\/wp-json\/wp\/v2\/posts\/187\/revisions\/188"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse200t-dsasa001\/wp-json\/wp\/v2\/media?parent=187"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse200t-dsasa001\/wp-json\/wp\/v2\/categories?post=187"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse200t-dsasa001\/wp-json\/wp\/v2\/tags?post=187"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}