{"id":333,"date":"2024-12-03T14:50:31","date_gmt":"2024-12-03T14:50:31","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jacobhenderson\/?p=333"},"modified":"2024-12-03T14:50:31","modified_gmt":"2024-12-03T14:50:31","slug":"write-up-on-scada-systems","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jacobhenderson\/2024\/12\/03\/write-up-on-scada-systems\/","title":{"rendered":"Write-Up on SCADA Systems"},"content":{"rendered":"\n<p>Assignment Description: &#8220;This write-up you will use the SCADA Systems (SCADA Systems, 2024) article, along with your own research, to explain the vulnerabilities associated with critical infrastructure systems, and the role SCADA applications play in mitigating these risks.<\/p>\n\n\n\n<p>This write-up is to be IN YOUR OWN WORDS, and must reference the aforementioned article, and at least one additional source of your choosing.&#8221;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-center\">The Security Concerns of SCADA Systems<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><br>Introduction:<br>    SCADA systems, or Supervisory Control and Data Acquisition systems, are the technological systems used to control, supervise, and maintain wide-scale infrastructure and industrial systems and processes. SCADA includes systems like water treatment, sewage, and energy, the critical infrastructures of a nation. These essential systems are under constant strain though, with \u201cmore than 40% of attacks reported to [the FBI] in 2023 related to critical infrastructure organizations,\u201d (Beecher, 2024). With how important these systems are to the health of the people, the organizations running them need to understand the defenses they need to provide for their SCADA systems and how to train the people running them.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Current Protections:<br>    There are numerous current working protections in most SCADA systems that are functional and important to understand. For example, master stations with multiple servers allow for \u201cdisaster recovery sites\u2026 dual-redundant formation, providing monitoring and continuous control during server failures\u201d (SCADA Systems, 2024). Other common security practices include \u201cspecialized industrialized VPN and firewall solutions for SCADA networks\u201d (SCADA Systems, 2024). While these technologies are among the more developed securities commonly provided, they alone are not enough and need to be expanded upon.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Technical Vulnerabilities:<br>    A major oversight of SCADA securities is the executives assuming the technology is already secure. However, because the systems have internet access \u201cthe vulnerability of the system is increased,\u201d (SCADA Systems, 2024). Additionally, the packet system SCADA systems use have a lack of inherit security protections, meaning that \u201cany person sending packets to a SCADA device is in a position to control it\u2026[providing] the capacity to bypass the security on control software and control SCADA networks.\u201d (SCADA Systems, 2024). The default securities provided when implementing a SCADA system is not enough, the agencies overseeing them need to model themselves after leading cybersecurity policies in the industry like Wi-SUN FAN that incorporates stronger firewalls, mesh topologies to stop entire systems from being affected, and certificate-based authentication (Beecher, 2024).<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Human Vulnerabilities:<br>    In addition to the vulnerabilities in the code, poorly trained employees can also create opportunities for attacks. No matter how secure the systems and backups are, all it takes is one hacked employee account to cost the company billions and affect public health. Strict password requirements, multi-factor authorization, and role-based authorization can all help protect from employee mistakes and minimize the damages a hacked account can cause.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Conclusion:<br>    While there are numerous apt protections for the SCADA systems running critical infrastructure systems, there are numerous glaring flaws in the code and risks in the human firewall. For the sake of public health and safety, the agencies involved with the SCADA systems need to take every possible measurement available to strengthen their securities. With a combination of patching vulnerabilities like sending packages allowing attackers to gain control, implementing better policies with a focus on mesh topologies and better authentication services, and in-depth employee training, SCADA systems can protect themselves from the every-growing rate of attacks on their infrastructure.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-center\">References<\/p>\n\n\n\n<p><br>Beecher, P. (2024, October 24). Why Cybersecurity Should Be at the Top of the Agenda for the Utilities Sector. The Fast Mode. Retrieved November 3, 2024, from https:\/\/www.thefastmode.com\/expert-opinion\/37864-why-cybersecurity-should-be-at-the-top-of-the-agenda-for-the-utilities-sector<br><\/p>\n\n\n\n<p>SCADA Systems. (2024). SCADA Systems. SCADA Systems &#8211; SCADA Systems. Retrieved November 3, 2024, from https:\/\/www.scadasystems.net\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Assignment Description: &#8220;This write-up you will use the SCADA Systems (SCADA Systems, 2024) article, along with your own research, to explain the vulnerabilities associated with critical infrastructure systems, and the role SCADA applications play in mitigating these risks. This write-up is to be IN YOUR OWN WORDS, and must reference the aforementioned article, and at&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jacobhenderson\/2024\/12\/03\/write-up-on-scada-systems\/\">Read More<\/a><\/div>\n","protected":false},"author":29688,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":3},"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jacobhenderson\/wp-json\/wp\/v2\/posts\/333"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jacobhenderson\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jacobhenderson\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jacobhenderson\/wp-json\/wp\/v2\/users\/29688"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jacobhenderson\/wp-json\/wp\/v2\/comments?post=333"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/jacobhenderson\/wp-json\/wp\/v2\/posts\/333\/revisions"}],"predecessor-version":[{"id":334,"href":"https:\/\/sites.wp.odu.edu\/jacobhenderson\/wp-json\/wp\/v2\/posts\/333\/revisions\/334"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jacobhenderson\/wp-json\/wp\/v2\/media?parent=333"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jacobhenderson\/wp-json\/wp\/v2\/categories?post=333"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jacobhenderson\/wp-json\/wp\/v2\/tags?post=333"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}