{"id":317,"date":"2026-04-12T20:59:00","date_gmt":"2026-04-12T20:59:00","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/david-flowers\/?p=317"},"modified":"2026-04-29T17:57:20","modified_gmt":"2026-04-29T17:57:20","slug":"scada-systems-vulnerabilities-and-the-mitigation-of-risks","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/david-flowers\/2026\/04\/12\/scada-systems-vulnerabilities-and-the-mitigation-of-risks\/","title":{"rendered":"Scada Systems: Vulnerabilities and the mitigation of risks"},"content":{"rendered":"\n<p class=\"has-text-align-center\">David Flowers<br>Department of video game development and design, Old Dominion University<br>CYSE-200: Cybersecurity, Technology &amp; Society<br>Dr. Christopher Bowman<br>April 12, 2026<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Critical infrastructure and Vulnerabilities<\/h2>\n\n\n\n<p>Like with all forms of technology there will always be different types of vulnerabilities<br>that will allow hackers to gain access to it. A lot of main critical infrastructure runs on a system<br>known as SCADA and this can be best described as an industrial control system (ICS). What this<br>does is it observes and manipulates critical infrastructure systems, and this can be seen when it is<br>stated in What is SCADA and SCADA system? (2026)\u201cTo define SCADA, it is an industrial<br>control system (ICS) that monitors and controls infrastructure processes.\u201d(p.1). Critical<br>infrastructures are mainly seen as services that we as a nation cannot survive without such as<br>energy, water, and waste control, and this can be seen when it is mentioned in What is SCADA<br>and SCADA system? (2026)\u201c organizations involved in the provision of electricity, natural gas,<br>waste control, water, and other necessary services.\u201d(p.1). Since many of these SCADA systems<br>have been in place and have been running for generations, some of these systems are outdated.<br>This can lead to weakness within the old procedures and ancient equipment voided from modern<br>security features. Due to this it has become a consistent and everlasting vulnerability within these<br>Critical infrastructures, and this can be seen from Koelemiji (2024)\u201dOutdated protocols and<br>legacy equipment, which often lack modern security features, remain a persistent<br>vulnerability.\u201d(p.1). This can make it easy to take advantage of by using packet access. This<br>allows a hacker to gain control of a system due to there being no packet control protocol, thus it<br>is easy for a person to gain access to such systems, and this can be seen from the article SCADA<br>systems (2026)\u201dIn numerous cases, there remains less or no security on actual packet control<br>protocol; therefore, any person sending packets to SCADA device is in position to control<br>it.\u201d(p.1).<br><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Applications that mitigate risk<\/h2>\n\n\n\n<p>These risks can be very detrimental and can cause damages that could potentially last<br>months. Currently what many critical infrastructures are doing about these weaknesses inside of<br>their SCADA systems is that they are manufacturing industrial VPNs. This will help with<br>preventing unwanted outside forces from accessing the SCADA systems in order to control<br>them. Another form of protection that critical infrastructures are putting into place are firewalls.<br>These are to strengthen the networks that run on TCP\/ICP, and this can be seen from the article<br>SCADA systems (2026) \u201cSCADA vendors are addressing these risks by developing specialized<br>VPN and firewall solutions for networks that are based on TCP\/ICP.\u201d(p.1). If a hacker were to<br>get past these then they would have full access to the system and be able to manipulate it to their<br>whim, thus a white listing solution was found. This allows only authorized individuals to<br>manipulate the system, and this is found in the article SCADA systems (2026) \u201cwhite-listing<br>solutions have been implemented due to their ability to prevent unauthorized application<br>changes.\u201d(p.1).<br><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Conclusion<\/h2>\n\n\n\n<p>To reiterate, SCADA is an industrial control system (ICS), and many critical<br>infrastructure, such as energy, water, and waste control, use it to control their facilities and<br>systems. A major vulnerability with these systems is that they are incredibly old and do not have<br>modern protections against current cybersecurity threats. This can leave them vulnerable to<br>packet control attacks that allow hackers to gain unauthorized control of a critical infrastructure.<br>A way to reduce the risk of this happening is by implementing VPN and firewalls to try and<br>mitigate the risk of a hacker breaking into the system. If a hacker were to get past these then a<br>white list could try to prevent them from manipulating the application since they would be<br>unauthorized to do so.<br><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">References<\/h2>\n\n\n\n<p>Koelemij, Sinclair. \u201cWhy Scada and DCS Face Different Cyber Threats.\u201d Industrial Cyber, 9<br>Dec. 2024,<br>industrialcyber.co\/expert\/why-scada-and-dcs-face-different-cyber-threats\/#:~:text=we%20can%2<br>0conclude:-,SCADA%20systems%20oversee%20processes%20across%20large%2C%20dispers<br>ed%20areas%E2%80%94like%20power,further%20complicates%20consistent%20security%20<br>measures.<\/p>\n\n\n\n<p><br>\u201cSCADA Systems.\u201d SCADA Systems, www.scadasystems.net\/. Accessed 10 Apr. 2026.<\/p>\n\n\n\n<p><br>\u201cWhat Is SCADA and SCADA System?\u201d Fortinet,<br>www.fortinet.com\/resources\/cyberglossary\/scada-and-scada-systems#:~:text=SCADA%20syste<br>ms%20are%20typically%20deployed,in%20place%20to%20protect%20them. Accessed 10 Apr.<br>2026.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>David FlowersDepartment of video game development and design, Old Dominion UniversityCYSE-200: Cybersecurity, Technology &amp; SocietyDr. Christopher BowmanApril 12, 2026 Critical infrastructure and Vulnerabilities Like with all forms of technology there will always be different types of vulnerabilitiesthat will allow hackers to gain access to it. A lot of main critical infrastructure runs on a systemknown&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/david-flowers\/2026\/04\/12\/scada-systems-vulnerabilities-and-the-mitigation-of-risks\/\">Read More<\/a><\/div>\n","protected":false},"author":31890,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/david-flowers\/wp-json\/wp\/v2\/posts\/317"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/david-flowers\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/david-flowers\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/david-flowers\/wp-json\/wp\/v2\/users\/31890"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/david-flowers\/wp-json\/wp\/v2\/comments?post=317"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/david-flowers\/wp-json\/wp\/v2\/posts\/317\/revisions"}],"predecessor-version":[{"id":319,"href":"https:\/\/sites.wp.odu.edu\/david-flowers\/wp-json\/wp\/v2\/posts\/317\/revisions\/319"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/david-flowers\/wp-json\/wp\/v2\/media?parent=317"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/david-flowers\/wp-json\/wp\/v2\/categories?post=317"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/david-flowers\/wp-json\/wp\/v2\/tags?post=317"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}