{"id":290,"date":"2023-12-06T17:14:39","date_gmt":"2023-12-06T17:14:39","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/dailenrich\/?p=290"},"modified":"2023-12-06T17:14:39","modified_gmt":"2023-12-06T17:14:39","slug":"write-up-2-vulnerabilities-associated-with-infrastructure-and-the-role-of-scada","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/dailenrich\/2023\/12\/06\/write-up-2-vulnerabilities-associated-with-infrastructure-and-the-role-of-scada\/","title":{"rendered":"Write up #2 -Vulnerabilities associated with Infrastructure and the role of SCADA"},"content":{"rendered":"\n<p><strong>BLUF<\/strong><br>Vulnerabilities are a part of the Structure of Adversity Scada faces. But with the<br>right team and knowledge, The right security implemented can help save multiple<br>lives and families.<\/p>\n\n\n\n<p><br><strong>What are infrastructure vulnerabilities?<\/strong><br>Infrastructure vulnerability is the process of scanning software for automated<br>systems that can be accessed through the internet making the vulnerability highly<br>increased. This makes The insertion of security techniques the standard for many<br>Improvements That can be applied to the SCADA system. However, the<br>infrastructure side of these vulnerabilities is strict with the communication aspect<br>because, without the knowledge of these vulnerabilities, it opens up the software to<br>Many Attacks, etc.<\/p>\n\n\n\n<p><br><strong>SCADA\u2019s Risk mitigation role<\/strong><br>The definition of SCADA stands for Supervisory Control and Data Advisory. And their<br>role is to control operations and focus on configuring systems for them to<br>manufacture. SCADAs\u2019 system concept refers to the control of Sites. Quite a few of<br>their Systems allow changes related to their alarm systems but data acquisitions<br>start PLCs(Programmable Logic controllers) That include status reports and readings<br>of data. One of SCADAs&#8217; roles falls on the supervisory team and that is Securing<br>LANs. Which is an attack prevention strategy whose primary focus is securing<br>configurations on networks that allow protocols for technology to be mandated.<\/p>\n\n\n\n<p><br><strong>Concluding statement<\/strong><br>To conclude my write-up, The effort SCADA puts into making sure its systems and<br>Framework are up to par is phenomenal. Their Mandating on LAN security is<br>substantial and not many Supervised Acquisitions can say that.<\/p>\n\n\n\n<p><br><strong>References<\/strong><br>SCADA systems. SCADA Systems. (n.d.). https:\/\/www.scadasystems.net<\/p>\n","protected":false},"excerpt":{"rendered":"<p>BLUFVulnerabilities are a part of the Structure of Adversity Scada faces. But with theright team and knowledge, The right security implemented can help save multiplelives and families. What are infrastructure vulnerabilities?Infrastructure vulnerability is the process of scanning software for automatedsystems that can be accessed through the internet making the vulnerability highlyincreased. This makes The insertion&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/dailenrich\/2023\/12\/06\/write-up-2-vulnerabilities-associated-with-infrastructure-and-the-role-of-scada\/\">Read More<\/a><\/div>\n","protected":false},"author":25444,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/dailenrich\/wp-json\/wp\/v2\/posts\/290"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/dailenrich\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/dailenrich\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dailenrich\/wp-json\/wp\/v2\/users\/25444"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dailenrich\/wp-json\/wp\/v2\/comments?post=290"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/dailenrich\/wp-json\/wp\/v2\/posts\/290\/revisions"}],"predecessor-version":[{"id":293,"href":"https:\/\/sites.wp.odu.edu\/dailenrich\/wp-json\/wp\/v2\/posts\/290\/revisions\/293"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/dailenrich\/wp-json\/wp\/v2\/media?parent=290"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dailenrich\/wp-json\/wp\/v2\/categories?post=290"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dailenrich\/wp-json\/wp\/v2\/tags?post=290"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}