{"id":302,"date":"2025-04-18T15:01:59","date_gmt":"2025-04-18T15:01:59","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/evansportfolio\/?p=302"},"modified":"2025-04-28T02:14:38","modified_gmt":"2025-04-28T02:14:38","slug":"write-up-scada-systems","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/evansportfolio\/2025\/04\/18\/write-up-scada-systems\/","title":{"rendered":"Write-Up &#8211; SCADA Systems"},"content":{"rendered":"\n<p>Demetrius Evans<br>CYSE 200T<br>March 30th<br>Professor Duvall<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><br>SCADA Systems<\/h2>\n\n\n\n<p><br>BLUF: SCADA systems are used in many different industries today including critical<br>infrastructure. These systems, while useful, can be major cybersecurity risks if the proper security measures aren\u2019t considered.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><br>What is SCADA?<\/h2>\n\n\n\n<p><br>SCADA systems, also known as Supervisory Control and Data Acquisition, are industrial control systems used to manage infrastructure, industrial, and facility processes of critical infrastructure (SCADA, 2020). SCADA systems help control everything from air transportation to power generation and primarily act as coordinators in real time processes (SCADA, 2020). SCADA systems are defined as PCSs, or Process Control Systems, which are used to both monitor and control remote and local processes the use the site\u2019s equipment or devices (Ryu et al. 2009). The main benefits of SCADA systems are their ability to increase efficiency, manage complex systems, and increasing reliability, but as time has gone on these systems have become more and more interconnected creating a major cybersecurity risk (Claroty, 2024).<br>Vulnerabilities of SCADA and Critical Infrastructure While SCADA systems are good tools for managing critical systems, they also come with major security risks. Firstly, many SCADA systems were designed and implemented decades ago meaning that they run on legacy software that was created for ease of access without any thought regarding security (Claroty, 2024).<\/p>\n\n\n\n<p><br>Authentication is missing from many of these systems, meaning unauthorized access,<br>by hackers or otherwise, is a major concern (SCADA, 2020).<br>SCADA systems, falling under the category of OT rather than IT, have the<br>downside that many of the common IT security tools cannot be used due to the specific<br>hardware used by SCADA systems and the chance that these tools would interfere with<br>the effectiveness of the systems (Claroty, 2024). The last and biggest security concern<br>for SCADA systems is remote access. SCADA systems lack proper security when it<br>comes to remote access, with internal and third-parties sometimes needing to access<br>these systems remotely for maintenance or other issues, this creates new points of<br>entry for attackers (Claroty, 2024).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><br>Best Protections for SCADA Systems<\/h2>\n\n\n\n<p><br>While SCADA systems have many vulnerabilities to exploit, leading experts in cybersecurity and critical infrastructure systems are constantly working on ways to make these systems more secure. The first step, generally, of securing these systems is increasing visibility and taking inventory and all devices, assets, and systems in the given critical infrastructure environment (Claroty, 2024). Having an inventory of assets allows for vulnerabilities to be discovered and monitored so that administrators can track threats and know where they will be coming from (Claroty, 2024). Integrating firewalls, VPNs, and physical security around hardware are also essential steps in reducing threat vectors (SCADA, 2020). VPNs and firewalls can make remote access more secure and prevent third parties from accessing data sent through remote access preventing malicious code from infecting the systems (SCADA, 2020). Physical security is essential, as if threat actors are able to access the physical hardware the entire system can be compromised (Brown, 2020). Customized security measures may also be necessary as traditional tools such as vulnerability scanners or IDSs (Intrusion Detection System) could interfere with the effectiveness of the SCADA system (Claroty, 2024).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><br>Conclusion<\/h2>\n\n\n\n<p><br>While SCADA systems are great tools for critical infrastructure, there tend to be cyber risks associated with them that can be difficult to solve. Traditional IT tools may be ineffective which could warrant building custom security measures tailored around these systems. To solve the vulnerabilities with the remote access that many of these systems utilize, firewalls and VPNs are some of the easiest and best ways to keep out third party attackers, and when used with physical security, greatly increase operational<br>security.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><br>Works Cited<\/h2>\n\n\n\n<p><br>SCADA Systems. (2020) \u201cUsing SCADA to Protect Critical Infrastructure and Systems\u201d<br>https:\/\/docs.google.com\/document\/d\/1VnMlL2YmcW5Jg4MdDa1dt5fJpmQM0KV<br>H\/edit?tab=t.0<br>Claroty Team. (2024) \u201cA Comprehensive Guide to SCADA Cybersecurity.\u201d Claroty.com<br>https:\/\/claroty.com\/blog\/a-comprehensive-guide-to-scada<br>cybersecurity#:~:text=Legacy%20Systems%3A%20SCADA%20systems%20wer<br>e,them%20vulnerable%20to%20cyber%20attacks.<br>Ryu, D. Kim, H. Um, K. (2009) \u201cReducing security vulnerabilities for critical<br>infrastructure.\u201d Journal of Loss Prevention in the Process Industries, Volume 22,<br>Issue 6, Pages 1020-1024, ISSN 0950-4230,<br>https:\/\/doi.org\/10.1016\/j.jlp.2009.07.015<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Demetrius EvansCYSE 200TMarch 30thProfessor Duvall SCADA Systems BLUF: SCADA systems are used in many different industries today including criticalinfrastructure. These systems, while useful, can be major cybersecurity risks if the proper security measures aren\u2019t considered. What is SCADA? SCADA systems, also known as Supervisory Control and Data Acquisition, are industrial control systems used to manage&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/evansportfolio\/2025\/04\/18\/write-up-scada-systems\/\">Read More<\/a><\/div>\n","protected":false},"author":30493,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":1},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/evansportfolio\/wp-json\/wp\/v2\/posts\/302"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/evansportfolio\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/evansportfolio\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/evansportfolio\/wp-json\/wp\/v2\/users\/30493"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/evansportfolio\/wp-json\/wp\/v2\/comments?post=302"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/evansportfolio\/wp-json\/wp\/v2\/posts\/302\/revisions"}],"predecessor-version":[{"id":310,"href":"https:\/\/sites.wp.odu.edu\/evansportfolio\/wp-json\/wp\/v2\/posts\/302\/revisions\/310"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/evansportfolio\/wp-json\/wp\/v2\/media?parent=302"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/evansportfolio\/wp-json\/wp\/v2\/categories?post=302"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/evansportfolio\/wp-json\/wp\/v2\/tags?post=302"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}