{"id":319,"date":"2025-04-26T17:02:55","date_gmt":"2025-04-26T06:02:55","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/glorionnaedwards\/?p=319"},"modified":"2025-04-28T12:52:32","modified_gmt":"2025-04-28T01:52:32","slug":"the-scada-systems","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/glorionnaedwards\/2025\/04\/26\/the-scada-systems\/","title":{"rendered":"The SCADA Systems"},"content":{"rendered":"\n<p>Glorionna Edwards-Cummings<\/p>\n\n\n\n<p>Professor Duvall<\/p>\n\n\n\n<p>Cybersecurity 200T<\/p>\n\n\n\n<p>March 30, 2025<\/p>\n\n\n\n<p>&#8212;<\/p>\n\n\n\n<p><strong>BLUF: <\/strong>The SCADA Systems is an industrial control system that operates various points such as the water systems and pipelines.<\/p>\n\n\n\n<p><strong>Vulnerabilities<\/strong><\/p>\n\n\n\n<p>Because the SCADA Systems is so valuable, it becomes a huge target from malicious individuals. As the systems adapt and evolve, so do the attacks. Though the systems have good security measures, there are still security risks present. A few examples include malware, viruses, unauthorized access, and data integrity risk. These threats can cause great damage to the systems with corruption, data loss, and inappropriate usage.<\/p>\n\n\n\n<p><strong>Managing Risk<\/strong><\/p>\n\n\n\n<p>There are a few countermeasures that aim to rectify and reduce the risk in these systems. Some solutions they have are developing specialized VPNs, firewalls, stricter policies, and restriction access. Having these in place help mitigate potential loss and instability with the systems. They can ensure that the confidentiality, integrity, and availability of the systems remain.<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>In conclusion, the SCADA Systems is a huge system that has targeted threats that they must manage. There are a few problems that that exist within the systems, however, they have various strategies to combat it.<\/p>\n\n\n\n<p>&#8212;<\/p>\n\n\n\n<p><strong>Works Cited<\/strong><\/p>\n\n\n\n<p>Using SCADA to Protect Critical Infrastructure and Systems.<\/p>\n\n\n\n<p>     <a href=\"https:\/\/docs.google.com\/document\/d\/1VnMlL2YmcW5Jg4MdDa1dt5fJpmQM0KVH\/%09edit?tab=t.0\">https:\/\/docs.google.com\/document\/d\/1VnMlL2YmcW5Jg4MdDa1dt5fJpmQM0KVH\/edit?tab=t.0<\/a><\/p>\n\n\n\n<p>SCADA Risk management: Protecting Critical Infrastructure.<\/p>\n\n\n\n<p><a href=\"https:\/\/claroty.com\/blog\/scada-risk-management-protecting-critical-infrastructure\">     https:\/\/claroty.com\/blog\/scada-risk-management-protecting-critical-infrastructure<\/a><\/p>\n\n\n\n<p>One Flaw too Many: Vulnerabilities in SCADA Systems.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/vulnerabilities-and-exploits\/one-flaw-too-many-vulnerabilities-in-scada-systems\">     https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/vulnerabilities-and-exploits\/one-flaw-too-many-vulnerabilities-in-scada-systems<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Glorionna Edwards-Cummings Professor Duvall Cybersecurity 200T March 30, 2025 &#8212; BLUF: The SCADA Systems is an industrial control system that operates various points such as the water systems and pipelines. Vulnerabilities Because the SCADA Systems is so valuable, it becomes a huge target from malicious individuals. As the systems adapt and evolve, so do the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/glorionnaedwards\/2025\/04\/26\/the-scada-systems\/\">Read More<\/a><\/div>\n","protected":false},"author":30501,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/glorionnaedwards\/wp-json\/wp\/v2\/posts\/319"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/glorionnaedwards\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/glorionnaedwards\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/glorionnaedwards\/wp-json\/wp\/v2\/users\/30501"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/glorionnaedwards\/wp-json\/wp\/v2\/comments?post=319"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/glorionnaedwards\/wp-json\/wp\/v2\/posts\/319\/revisions"}],"predecessor-version":[{"id":338,"href":"https:\/\/sites.wp.odu.edu\/glorionnaedwards\/wp-json\/wp\/v2\/posts\/319\/revisions\/338"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/glorionnaedwards\/wp-json\/wp\/v2\/media?parent=319"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/glorionnaedwards\/wp-json\/wp\/v2\/categories?post=319"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/glorionnaedwards\/wp-json\/wp\/v2\/tags?post=319"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}