{"id":285,"date":"2023-12-06T21:42:19","date_gmt":"2023-12-06T21:42:19","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jakebreitbeil\/?p=285"},"modified":"2023-12-06T21:42:19","modified_gmt":"2023-12-06T21:42:19","slug":"scada-systems","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jakebreitbeil\/2023\/12\/06\/scada-systems\/","title":{"rendered":"SCADA Systems"},"content":{"rendered":"\n<p>SCADA Systems with proper security are an effective method of protecting critical infrastructure.<br><br>Critical Infrastructure Threats<br><br>Critical infrastructure has vulnerabilities to cyberattacks and physical attacks. Utilities like the<br>power grid, water distribution, traffic systems, oil and gas pipelines. They are vulnerable to<br>cyberattacks, where they could be shut down and held for ransom. \u201cIn December 2015, the world<br>witnessed the first known power outage caused by a malicious cyber-attack. Three utilities<br>companies in Ukraine were hit by BlackEnergy malware, leaving hundreds of thousands of<br>homes without electricity for six hours.\u201d (Allianz Commercial)<br><br>Role of SCADA Systems<br><br>The use of SCADA (Supervisory control and data acquisition) Systems to control and monitor the<br>infrastructure. Implementing a secure private network with proper security procedures. Also<br>making sure that physical jack points and network switches are properly secured behind locked<br>doors with a security guard. Also making sure that there are proper access roles for individuals<br>who have authorization to access the system.<br><br>Conclusion<br><br>The implementation of SCADA systems with proper security systems can help protect against<br>cyber attacks and keep critical infrastructure running.<br><br>References<br><br>Cyber attacks on Critical Infrastructure. Allianz Commercial. (n.d.).<br>https:\/\/commercial.allianz.com\/news-and-insights\/expert-risk-articles\/cyber-attacks-on-critic<br>al-infrastructure.html<br>SCADA systems. SCADA Systems. (n.d.). https:\/\/www.scadasystems.net\/<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>SCADA Systems with proper security are an effective method of protecting critical infrastructure. Critical Infrastructure Threats Critical infrastructure has vulnerabilities to cyberattacks and physical attacks. Utilities like thepower grid, water distribution, traffic systems, oil and gas pipelines. They are vulnerable tocyberattacks, where they could be shut down and held for ransom. \u201cIn December 2015, the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jakebreitbeil\/2023\/12\/06\/scada-systems\/\">Read More<\/a><\/div>\n","protected":false},"author":17995,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jakebreitbeil\/wp-json\/wp\/v2\/posts\/285"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jakebreitbeil\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jakebreitbeil\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jakebreitbeil\/wp-json\/wp\/v2\/users\/17995"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jakebreitbeil\/wp-json\/wp\/v2\/comments?post=285"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/jakebreitbeil\/wp-json\/wp\/v2\/posts\/285\/revisions"}],"predecessor-version":[{"id":289,"href":"https:\/\/sites.wp.odu.edu\/jakebreitbeil\/wp-json\/wp\/v2\/posts\/285\/revisions\/289"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jakebreitbeil\/wp-json\/wp\/v2\/media?parent=285"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jakebreitbeil\/wp-json\/wp\/v2\/categories?post=285"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jakebreitbeil\/wp-json\/wp\/v2\/tags?post=285"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}