{"id":296,"date":"2025-04-08T16:54:29","date_gmt":"2025-04-08T16:54:29","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/funmiafolabi\/?p=296"},"modified":"2025-04-08T16:54:29","modified_gmt":"2025-04-08T16:54:29","slug":"scada-systems","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/funmiafolabi\/2025\/04\/08\/scada-systems\/","title":{"rendered":"SCADA Systems"},"content":{"rendered":"\n<p><br> <br>BLUF: In this paper there will be a discussion about the Supervisory Control and Data Acquisition Systems (SCADA).  Additionally, there will be an explanation of the vulnerabilities associated with critical infrastructure systems and how the SCADA applications play a role in mitigating the risks that may arise (\u201cSCADA\u201d, 2011).  <br><strong><br>What are SCADA Systems?<br><\/strong>SCADA, which means Supervisory Control and Data Acquisition is a system that collects data from a plethora of sensors in various locations and sends the data to a central computer to then manage and control the data. It is also referred to industrial control systems that control infrastructure processes such as, water treatment and wind farms (\u201cSCADA Systems\u201d, n.d.). <br><br>Within the SCADA system there is the Human Machine Interface (HMI), Remote Terminal Units (RTU) and Programmable Logic Controllers (PLC) all of which, contribute to the monitoring of a system in real time. HMI is a user interface where data is processed to reach a human operator (\u201cSCADA Systems\u201d, n.d.). The data is also translated into graphics and mimic diagrams making it easier for the human operator to control the system (\u201cSCADA Systems\u201d, n.d.). Furthermore, Human Machine Interface helps in monitoring multiple RTUs or PLCs at a time (\u201cSCADA\u201d, 2011). Remote Terminal Units converts all electrical signals coming from equipment into values that are easy to control (\u201cSCADA Systems\u201d, n.d.). Programming Logic Controllers are industrial computers that control automated processes in industries. They also have a function to monitor the input and output of data (\u201cThe Role of Programmable Logic Controllers in a SCADA System\u201d, n.d.)<\/p>\n\n\n\n<p><br><strong>Vulnerabilities associated with critical infrastructure systems <\/strong><br>Critical infrastructures are assets, systems, and networks that provide functions necessary for our way of life (\u201cCritical Infrastructure Security and Resilience\u201d, n.d.). Some examples include Emergency services and Water supply systems. Therefore, if exposed to any vulnerabilities, it could lead to detrimental effects for many individuals. Vulnerabilities are characteristics of a system that could cause it to suffer a loss as a result of, being subjected to certain threats (Robles, n.d.). The threats are categorized into natural threats, human caused, accidental and or technical all of which, can cause a cyberattack (Robles, n.d.). For example, if someone gains unauthorized access to software this can cause potential malfunctions and viruses (\u201cSCADA Systems\u201d, n.d.). Additionally, unauthorized changes to programmed instructions in the PLC\u2019s or RTUs may occur (Robles, n.d.). <br><br><strong>SCADA\u2019s role in mitigating these risks <\/strong><br>SCADA can play an important role in mitigating these risks by potentially setting up a SCADA risk management program. This effectively assesses, prioritizes and reduces cyber-attacks (Claroty, 2024). By having a framework of what potential risks may arise and by putting solutions in place, future risks can be prevented. Moreover, there are certain measures that mitigate the risks that may arise in SCADA systems. Initially, it is important to properly manage authorization and user accounts (\u201cOne Flaw too Many\u201d, 2019). This is because, by regularly monitoring who has access to the system, one can help to reduce unexpected breaches of privacy. Next, implementing regular system updates are vital for mitigating the risks that may arise in SCADA systems.  Finally, prevent any potential future cyber-attacks though the application of strict policies for all connecting devices to SCADA systems.<br><br><strong>Conclusion<\/strong><br>To conclude there has been a discussion of what SCADA (Supervisory Control and Data Acquisition Systems) is and the components of its systems such as, Human Machine Interface (HMI), Remote Terminal Units (RTU) and Programmable Logic Controllers (PLC). Furthermore, vulnerabilities associated with critical infrastructure systems were mentioned and explained. Finally, the role SCADA applications play in mitigating these vulnerabilities were also discussed. <\/p>\n\n\n\n<p><strong>References<\/strong><\/p>\n\n\n\n<p><em>Critical Infrastructure Security and Resilience<\/em>. n.d. <a href=\"https:\/\/www.cisa.gov\/topics\/critical-infrastructure-security-and-resilience\"><strong>Critical Infrastructure Security and Resilience | Cybersecurity and Infrastructure Security Agency CISA<\/strong><\/a><\/p>\n\n\n\n<p>Claroty. 2024. <em>SCADA Risk Management: Protecting Critical Infrastructure<\/em>. <a href=\"https:\/\/claroty.com\/blog\/scada-risk-management-protecting-critical-infrastructure\"><strong>SCADA Risk Management: Protecting Critical Infrastructure | Claroty<\/strong><\/a><strong><\/strong><\/p>\n\n\n\n<p>Robles. n.d. <em>Common Threats and Vulnerabilities of Critical Infrastructures<\/em>. <a href=\"https:\/\/citeseerx.ist.psu.edu\/document?repid=rep1&amp;type=pdf&amp;doi=7098a29a404f8561c7f3c66801b6e1f36f88b7b7\"><strong>Microsoft Word &#8211; rosslin_paper1.doc<\/strong><\/a><strong><\/strong><\/p>\n\n\n\n<p>Robles. n.d. <em>Common Threats and Vulnerabilities of Critical Infrastructures<\/em>. <a href=\"https:\/\/citeseerx.ist.psu.edu\/document?repid=rep1&amp;type=pdf&amp;doi=7098a29a404f8561c7f3c66801b6e1f36f88b7b7\"><strong>Microsoft Word &#8211; rosslin_paper1.doc<\/strong><\/a><strong><\/strong><\/p>\n\n\n\n<p>Robles. n.d. <em>Common Threats and Vulnerabilities of Critical Infrastructures<\/em>. <a href=\"https:\/\/citeseerx.ist.psu.edu\/document?repid=rep1&amp;type=pdf&amp;doi=7098a29a404f8561c7f3c66801b6e1f36f88b7b7\"><strong>Microsoft Word &#8211; rosslin_paper1.doc<\/strong><\/a><strong><\/strong><\/p>\n\n\n\n<p><em>SCADA<\/em>. (2011). <a href=\"https:\/\/www.tech-faq.com\/scada.html\"><strong>SCADA &#8211; Tech-FAQ<\/strong><\/a><strong><\/strong><\/p>\n\n\n\n<p><em>SCADA<\/em>. (2011). <a href=\"https:\/\/www.tech-faq.com\/scada.html\"><strong>SCADA &#8211; Tech-FAQ<\/strong><\/a><\/p>\n\n\n\n<p><em>SCADA Systems<\/em>. n.d. <a href=\"https:\/\/docs.google.com\/document\/d\/1DvxnWUSLe27H5u8A6yyIS9Qz7BVt_8p2WeNHctGVboY\/edit?tab=t.0\">SCADA Systems &#8211; Google Docs<\/a><strong><\/strong><\/p>\n\n\n\n<p><em>SCADA Systems<\/em>. n.d. <a href=\"https:\/\/docs.google.com\/document\/d\/1DvxnWUSLe27H5u8A6yyIS9Qz7BVt_8p2WeNHctGVboY\/edit?tab=t.0\">SCADA Systems &#8211; Google Docs<\/a><strong><\/strong><\/p>\n\n\n\n<p><em>SCADA Systems<\/em>. n.d. <a href=\"https:\/\/docs.google.com\/document\/d\/1DvxnWUSLe27H5u8A6yyIS9Qz7BVt_8p2WeNHctGVboY\/edit?tab=t.0\">SCADA Systems &#8211; Google Docs<\/a><strong><\/strong><\/p>\n\n\n\n<p><em>SCADA Systems<\/em>. n.d. <a href=\"https:\/\/docs.google.com\/document\/d\/1DvxnWUSLe27H5u8A6yyIS9Qz7BVt_8p2WeNHctGVboY\/edit?tab=t.0\">SCADA Systems &#8211; Google Docs<\/a><strong><\/strong><\/p>\n\n\n\n<p><em>SCADA Systems<\/em>. n.d. <a href=\"https:\/\/docs.google.com\/document\/d\/1DvxnWUSLe27H5u8A6yyIS9Qz7BVt_8p2WeNHctGVboY\/edit?tab=t.0\">SCADA Systems &#8211; Google Docs<\/a><\/p>\n\n\n\n<p><em>The Role of Programmable Logic Controllers in a SCADA System<\/em>. n.d. <a href=\"https:\/\/www.htt.io\/learning-center\/the-role-of-programmable-logic-controllers-in-a-scada-system#:~:text=PLC%20stands%20for%20programmable%20logic,and%20input%20within%20the%20system.\"><strong>Htt.io<\/strong><\/a><strong><\/strong><\/p>\n\n\n\n<p><em>One Flaw too Many<\/em>. 2019. <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/vulnerabilities-and-exploits\/one-flaw-too-many-vulnerabilities-in-scada-systems#:~:text=It%20should%20be%20noted%20that,DoS)%2C%20or%20steal%20information.\"><strong>One Flaw too Many: Vulnerabilities in SCADA Systems | Trend Micro (US)<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>BLUF: In this paper there will be a discussion about the Supervisory Control and Data Acquisition Systems (SCADA). Additionally, there will be an explanation of the vulnerabilities associated with critical infrastructure systems and how the SCADA applications play a role in mitigating the risks that may arise (\u201cSCADA\u201d, 2011). What are SCADA Systems?SCADA, which means&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/funmiafolabi\/2025\/04\/08\/scada-systems\/\">Read More<\/a><\/div>\n","protected":false},"author":30506,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/funmiafolabi\/wp-json\/wp\/v2\/posts\/296"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/funmiafolabi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/funmiafolabi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/funmiafolabi\/wp-json\/wp\/v2\/users\/30506"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/funmiafolabi\/wp-json\/wp\/v2\/comments?post=296"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/funmiafolabi\/wp-json\/wp\/v2\/posts\/296\/revisions"}],"predecessor-version":[{"id":300,"href":"https:\/\/sites.wp.odu.edu\/funmiafolabi\/wp-json\/wp\/v2\/posts\/296\/revisions\/300"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/funmiafolabi\/wp-json\/wp\/v2\/media?parent=296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/funmiafolabi\/wp-json\/wp\/v2\/categories?post=296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/funmiafolabi\/wp-json\/wp\/v2\/tags?post=296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}