{"id":284,"date":"2022-12-02T18:03:25","date_gmt":"2022-12-02T18:03:25","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/josephfoley\/?p=284"},"modified":"2022-12-02T18:03:28","modified_gmt":"2022-12-02T18:03:28","slug":"scada-systems-revealed","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/josephfoley\/2022\/12\/02\/scada-systems-revealed\/","title":{"rendered":"SCADA Systems Revealed"},"content":{"rendered":"\n<p><em>This article goes in-depth on the current situation of SCADA Systems, and what <br>infrastructure it runs on. They showed the many vulnerabilities that could occur with the <br>system and how to solve it. I believe they need to completely revamp the cybersecurity <br>protocols they have so that the United States&#8217; infrastructure can become more secure.<\/em><\/p>\n\n\n\n<p><br><strong>Introduction to Critical Infrastructure<\/strong><br>When important infrastructure was being developed, there was no modern <br>technology like there is today. Things such as \u201cdistribution of water, traffic lights, <br>electricity transmissions, gas transportation, and oil pipelines\u201d (SCADA Systems), were <br>data and accessibility on local old computers. And those systems are currently being <br>added to the internet, which is making them vulnerable to cyber-attacks.<br>Anyone around the world can log into the SCADA computer system and access <br>and hack the company. An example of this happening would be the hack on the colonial <br>pipeline in May of 2021. The pipeline was shut down for several days and it affected the <br>gas and oil prices for millions of Americans around the country (Colonial pipeline, <br>Kerner). A hack like this could occur to any critical infrastructure in our country, and <br>with increasing tensions with other nations such as North Korea or Russia, we could be at <br>a risk.<br><br><strong>The Problem<\/strong><br>SCADA security systems are fairly underdeveloped and could be in danger of <br>cyberattacks every day. If critical infrastructure gets taken down, millions of people could <br>lose their lives. If someone were to hack into the way our water is distributed, they could <br>control the machines and put poison in the water. Potentially killing a large number of <br>people, and this is just one of the many infrastructures that can be hacked that are run  on <br>SCADA systems.<br><br><strong>Solution<\/strong><br>To solve this predicament there needs to be big changes to the current SCADA <br>system. This is projected to cost a lot of money and manpower to actually update and <br>solve our security measures, however, it will be worth it. The current answer SCADA has <br>is to use VPN to provide protection, however, that can be worked around if someone has <br>the physical address. They are also trying to address these issues by developing <br>\u201cspecialized VPN and firewall solutions for SCADA networks\u201d (SCADA Systems), <br>however, these are just slowing down the inevitable. In order to successfully stop <br>potential cyber attacks on SCADA Systems, there needs to be a massive update on the <br>infrastructure. <br><br><strong>Conclusion<\/strong><br>SCADA Systems are currently running a majority of the infrastructure in the <br>United States of America, and are doing so on older vulnerable systems. These systems <br>can be easily hacked and assessed by criminals all over the world. In order to stop and <br>prevent this from occurring, they need to update the current security measures. This is so <br>that millions of lives aren\u2019t affected if one of these infrastructures were to go down.<br><br><strong>References<\/strong><br>Kerner, S. M. (2022, April 26). Colonial pipeline hack explained: Everything you need to <br>know. WhatIs.com. Retrieved November 5, 2022, from <br>https:\/\/www.techtarget.com\/whatis\/feature\/Colonial-Pipeline-hack-explained-<br>Everything-you-need-to-know<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article goes in-depth on the current situation of SCADA Systems, and what infrastructure it runs on. They showed the many vulnerabilities that could occur with the system and how to solve it. I believe they need to completely revamp the cybersecurity protocols they have so that the United States&#8217; infrastructure can become more secure&#8230;. <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/josephfoley\/2022\/12\/02\/scada-systems-revealed\/\">Read More<\/a><\/div>\n","protected":false},"author":24973,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/josephfoley\/wp-json\/wp\/v2\/posts\/284"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/josephfoley\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/josephfoley\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/josephfoley\/wp-json\/wp\/v2\/users\/24973"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/josephfoley\/wp-json\/wp\/v2\/comments?post=284"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/josephfoley\/wp-json\/wp\/v2\/posts\/284\/revisions"}],"predecessor-version":[{"id":290,"href":"https:\/\/sites.wp.odu.edu\/josephfoley\/wp-json\/wp\/v2\/posts\/284\/revisions\/290"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/josephfoley\/wp-json\/wp\/v2\/media?parent=284"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/josephfoley\/wp-json\/wp\/v2\/categories?post=284"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/josephfoley\/wp-json\/wp\/v2\/tags?post=284"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}