{"id":297,"date":"2024-12-02T02:05:31","date_gmt":"2024-12-02T02:05:31","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ellis\/?p=297"},"modified":"2024-12-02T02:05:31","modified_gmt":"2024-12-02T02:05:31","slug":"scada-systems","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/ellis\/2024\/12\/02\/scada-systems\/","title":{"rendered":"SCADA Systems"},"content":{"rendered":"\n<p>In this write-up you will use the\u00a0<a href=\"https:\/\/docs.google.com\/document\/d\/1DvxnWUSLe27H5u8A6yyIS9Qz7BVt_8p2WeNHctGVboY\/edit?usp=sharing\" target=\"_blank\" rel=\"noreferrer noopener\">SCADA SystemsLinks to an external site.<\/a>\u00a0article, along with your own research, to explain the vulnerabilities associated with critical infrastructure systems, and the role SCADA applications play in mitigating these risks.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Keeping Critical Infrastructure Safe<\/strong><\/p>\n\n\n\n<p><em>\u201cSCADA systems are<\/em> also used for monitoring and controlling physical processes, like the distribution of water, traffic lights, electricity transmissions, gas transportation and oil pipelines, and other systems used in modern society\u201d (Scada Systems, p. 6). These systems must have tight security,<em> as they are vulnerable to security attacks by cybersecurity criminals. An incident at one of the locations could cause great harm or loss of lives.<\/em><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Packet Control Protocols<\/strong><\/p>\n\n\n\n<p>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 This class has taught us cybersecurity criminals are one step ahead of what is being protected. The biggest threat to packet control protocol is that it is easy for cybersecurity criminals to control the entire system. \u201cIn numerous cases, there remains less or no security on actual packet control protocol; therefore, any person sending packets to a SCADA device is in a position to control it\u201d (Scada Systems, p. 6).\u00a0This can be fixed by ensuring the packet is authenticated before the packet is received. SCADA can use firewalls to block suspicious packets. SCADA can use firmware updates to mitigate this risk.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Unauthorized Access<\/strong><\/p>\n\n\n\n<p>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Another threat is unauthorized access to the system. Now that the SCADA is using the third-generation system, the system is open to being hacked by the internet. The SCADA can use user roles to mitigate this risk. \u201cAuthorization allows an entity to access and perform determined actions regarding data.\u00a0In order to be effective, authorization should be based on the roles that an entity may have\u201d (de Oliveira Albuquerque, 2014, p. 22760). \u00a0In 2021, a hacker gained access to a water facility in Florida. The hacker used unauthorized access to change the chemical mixes. This type of unauthorized access could have been fatal. The water company should use two-factor authentication. They should have a robust system of password requirements. They should separate operational networks. Lastly, they should ensure that only those who need those user roles have them.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 SCADA systems protect important infrastructure and must be protected at all costs. If they are not protected, it can be fatal or have serious consequences. Consequences could result in loss of trust in business, lawsuits, loss of money, and even concerns of more cyber-attacks.\u00a0 Simple solutions of training, employee awareness, audits, encryption, authentication, and updated software can make a difference in protecting critical infrastructure.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>References:<\/strong><\/p>\n\n\n\n<p>Adefemi Alimi, K. O., Ouahada, K., Abu-Mahfouz, A. M., &amp; Rimer, S. (2020). A Survey on the<\/p>\n\n\n\n<p>Security of Low Power Wide Area Networks: Threats, Challenges, and Potential Solutions.&nbsp;<em>Sensors (14248220)<\/em>,&nbsp;<em>20<\/em>(20), 5800. https:\/\/doi-org.proxy.lib.odu.edu\/10.3390\/s20205800<\/p>\n\n\n\n<p><a><\/a>SCADA Systems, http:\/\/www.scadasystems.net<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br><br><\/p>\n\n\n\n<p><br><br><\/p>\n\n\n\n<p class=\"has-text-align-left\"><\/p>\n\n\n\n<p class=\"has-text-align-center\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this write-up you will use the\u00a0SCADA SystemsLinks to an external site.\u00a0article, along with your own research, to explain the vulnerabilities associated with critical infrastructure systems, and the role SCADA applications play in mitigating these risks. Keeping Critical Infrastructure Safe \u201cSCADA systems are also used for monitoring and controlling physical processes, like the distribution of&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ellis\/2024\/12\/02\/scada-systems\/\">Read More<\/a><\/div>\n","protected":false},"author":29608,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ellis\/wp-json\/wp\/v2\/posts\/297"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ellis\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ellis\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ellis\/wp-json\/wp\/v2\/users\/29608"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ellis\/wp-json\/wp\/v2\/comments?post=297"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/ellis\/wp-json\/wp\/v2\/posts\/297\/revisions"}],"predecessor-version":[{"id":298,"href":"https:\/\/sites.wp.odu.edu\/ellis\/wp-json\/wp\/v2\/posts\/297\/revisions\/298"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ellis\/wp-json\/wp\/v2\/media?parent=297"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ellis\/wp-json\/wp\/v2\/categories?post=297"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ellis\/wp-json\/wp\/v2\/tags?post=297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}