{"id":297,"date":"2024-12-03T23:45:41","date_gmt":"2024-12-03T23:45:41","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/donta-mackey-jr\/?p=297"},"modified":"2024-12-03T23:45:41","modified_gmt":"2024-12-03T23:45:41","slug":"what-are-scada-systems","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/donta-mackey-jr\/2024\/12\/03\/what-are-scada-systems\/","title":{"rendered":"What Are SCADA Systems?"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Introduction<\/h2>\n\n\n\n<p>SCADA systems are how we coordinate processes in real-time. The system itself is like a control<br>center, meaning that it is most vulnerable to cyber or physical threats. SCADA systems are useful<br>but vulnerable for several reasons. My example is SCADA incorporates legacy systems to<br>communicate, legacy systems are older systems. As an older system, a legacy system often<br>doesn&#8217;t have cybersecurity measurements built into it to stop a cyberattack. The acceptance of<br>this is the third generation of SCADA systems, which unlike the two is connected through WAN<br>protocols. Due to being connected via the internet, security measures can be implemented into a<br>third-generation SCADA system. However, the downside of this is the vulnerability that comes<br>with being connected to the internet. Making SCADA systems connected to the original at risk of<br>some form of attack.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><br>Mitigate \u2013 Mitigate &#8211; Mitigate<\/h2>\n\n\n\n<p>This can be mitigated by applying cybersecurity strategies like the CIA triad. There needs to be a<br>better way of protecting SCADA systems is crucial. Being isolated from the internet most of the<br>time, there must be a way to mitigate physical attacks. Whether that be extensive background<br>checks or constant management of SCADA systems nearby. Every measure needs to be taken to<br>maintain these SCADA systems as they are essential aspects of the modern day.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction SCADA systems are how we coordinate processes in real-time. The system itself is like a controlcenter, meaning that it is most vulnerable to cyber or physical threats. SCADA systems are usefulbut vulnerable for several reasons. My example is SCADA incorporates legacy systems tocommunicate, legacy systems are older systems. As an older system, a legacy&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/donta-mackey-jr\/2024\/12\/03\/what-are-scada-systems\/\">Read More<\/a><\/div>\n","protected":false},"author":29919,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":5},"categories":[5],"tags":[4,3],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/donta-mackey-jr\/wp-json\/wp\/v2\/posts\/297"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/donta-mackey-jr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/donta-mackey-jr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donta-mackey-jr\/wp-json\/wp\/v2\/users\/29919"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donta-mackey-jr\/wp-json\/wp\/v2\/comments?post=297"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/donta-mackey-jr\/wp-json\/wp\/v2\/posts\/297\/revisions"}],"predecessor-version":[{"id":298,"href":"https:\/\/sites.wp.odu.edu\/donta-mackey-jr\/wp-json\/wp\/v2\/posts\/297\/revisions\/298"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/donta-mackey-jr\/wp-json\/wp\/v2\/media?parent=297"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donta-mackey-jr\/wp-json\/wp\/v2\/categories?post=297"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donta-mackey-jr\/wp-json\/wp\/v2\/tags?post=297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}