{"id":300,"date":"2024-11-18T16:33:14","date_gmt":"2024-11-18T16:33:14","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jayceclancey\/?p=300"},"modified":"2024-11-18T16:33:14","modified_gmt":"2024-11-18T16:33:14","slug":"write-up-scada-systems","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jayceclancey\/2024\/11\/18\/write-up-scada-systems\/","title":{"rendered":"Write-Up SCADA Systems"},"content":{"rendered":"\n<p>Jayce Clancey<br>October 27, 2024<br>CYSE 200T<br>BLUF: \u201cSupervisory Control and Data Acquisition (SCADA) refers to Industrial Control<br>Systems used to control infrastructure processes, facility-based, processes, or industrial<br>processes\u201d http:\/\/www.scadasystems.net<br>1. Cybersecurity Threats<br>\u25cf Unauthorized Access<br>Hackers may attempt to get into unauthorized access to control systems,<br>potentially corrupt systems, steal data, or cause harm.<br>2. Infrastructure getting old<br>\u25cf Many critical infrastructure systems are outdated and may be not fully<br>updated to handle present technology cyber threats. This can lead to the<br>systems failing and increased risk to cyber threats<br>3. Physical Attacks<br>\u25cf Critical infrastructure systems are also open to physical threats like<br>sabotage, terrorism, or natural disasters. These can damage the<br>infrastructure directly .<br>Conclusion: SCADA systems are important for a lot of very important things, but they are<br>very vulnerable to all types of attacks ranging from cyber attacks to physical attacks.<br>These can be maintained by upgrading and protecting systems.<br>Advantages and Disadvantages Of Scada: Explained.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Jayce ClanceyOctober 27, 2024CYSE 200TBLUF: \u201cSupervisory Control and Data Acquisition (SCADA) refers to Industrial ControlSystems used to control infrastructure processes, facility-based, processes, or industrialprocesses\u201d http:\/\/www.scadasystems.net1. Cybersecurity Threats\u25cf Unauthorized AccessHackers may attempt to get into unauthorized access to control systems,potentially corrupt systems, steal data, or cause harm.2. Infrastructure getting old\u25cf Many critical infrastructure systems are outdated&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jayceclancey\/2024\/11\/18\/write-up-scada-systems\/\">Read More<\/a><\/div>\n","protected":false},"author":29530,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jayceclancey\/wp-json\/wp\/v2\/posts\/300"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jayceclancey\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jayceclancey\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jayceclancey\/wp-json\/wp\/v2\/users\/29530"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jayceclancey\/wp-json\/wp\/v2\/comments?post=300"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/jayceclancey\/wp-json\/wp\/v2\/posts\/300\/revisions"}],"predecessor-version":[{"id":301,"href":"https:\/\/sites.wp.odu.edu\/jayceclancey\/wp-json\/wp\/v2\/posts\/300\/revisions\/301"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jayceclancey\/wp-json\/wp\/v2\/media?parent=300"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jayceclancey\/wp-json\/wp\/v2\/categories?post=300"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jayceclancey\/wp-json\/wp\/v2\/tags?post=300"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}