{"id":362,"date":"2025-05-04T21:18:55","date_gmt":"2025-05-04T21:18:55","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/kdotportfolio\/?page_id=362"},"modified":"2025-05-04T21:21:48","modified_gmt":"2025-05-04T21:21:48","slug":"write-up-scada-systems","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/kdotportfolio\/write-up-scada-systems\/","title":{"rendered":"Write-Up: SCADA Systems"},"content":{"rendered":"\n<p>Kwabena Asumadu<br>04\/06\/2025<br>Write Up: Scada Systems<br>Introduction<br>Critical infrastructure networks such as power, water, and transportation are the<br>lifelines of modern civilization. These networks depend to a great extent on SCADA<br>applications for their daily functioning. Yet with growing digitization, these life-supporting<br>networks are softer targets than ever before for cyber attacks.<br>Vulnerabilities in Critical Infrastructure<br>As stated in the SCADA Systems article, most of the legacy SCADA installations<br>were not designed with cybersecurity in mind. They may lack a strong password,<br>encryption, or even elementary defenses against external attacks (SCADA Systems,<br>n.d.). Since the systems are now networked to larger systems, they are vulnerable to<br>malware, ransomware, and unauthorized access. A successful attack has the potential<br>to take down power grids or poison water systems.<br>The Cybersecurity and Infrastructure Security Agency (CISA) also lists poor<br>patching habits, outdated software, and human mistake as among the greatest dangers<br>to industrial systems (CISA, 2023). Such vulnerabilities reflect how even limited security<br>flaws can result in severe disruptions.<br>The Role of Scada in Risk Reduction<br>Despite these risks, SCADA systems also play an important role in infrastructure<br>security. Real-time monitoring, automatic alarm, and access control for users are some<br>of the attributes of contemporary SCADA applications. These attributes help operators<br>respond to problems quickly and prevent minor problems from becoming major failures.<br>Conclusion<br>SCADA systems are both a vulnerability and a line of defense. Through<br>continuous updating and maintenance, they can be made to help safeguard the critical<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>services that we use every day. As technology further advances, ensuring SCADA<br>systems are secure will be central to defending critical infrastructure.<br>References:<br>1. CISA. (2023). Improving Industrial Control Systems Cybersecurity. Cybersecurity<br>and Infrastructure Security Agency. https:\/\/www.cisa.gov\/news-events\/news\/ics-<br>cybersecurity<a href=\"https:\/\/www.cisa.gov\/news-events\/news\/ics-cybersecurity\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.cisa.gov\/news-events\/news\/ics-cybersecurity\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>2. SCADA Systems. (n.d.). SCADA Systems Overview. Retrieved from<br>https:\/\/docs.google.com\/document\/d\/1DvxnWUSLe27H5u8A6yyIS9Qz7BVt_8p2<br>WeNHctGVboY\/edit<a href=\"https:\/\/docs.google.com\/document\/d\/1DvxnWUSLe27H5u8A6yyIS9Qz7BVt_8p2WeNHctGVboY\/edit\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kwabena Asumadu04\/06\/2025Write Up: Scada SystemsIntroductionCritical infrastructure networks such as power, water, and transportation are thelifelines of modern civilization. These networks depend to a great extent on SCADAapplications for their daily functioning. Yet with growing digitization, these life-supportingnetworks are softer targets than ever before for cyber attacks.Vulnerabilities in Critical InfrastructureAs stated in the SCADA Systems article,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/kdotportfolio\/write-up-scada-systems\/\">Read More<\/a><\/div>\n","protected":false},"author":28080,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kdotportfolio\/wp-json\/wp\/v2\/pages\/362"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kdotportfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kdotportfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kdotportfolio\/wp-json\/wp\/v2\/users\/28080"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kdotportfolio\/wp-json\/wp\/v2\/comments?post=362"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/kdotportfolio\/wp-json\/wp\/v2\/pages\/362\/revisions"}],"predecessor-version":[{"id":374,"href":"https:\/\/sites.wp.odu.edu\/kdotportfolio\/wp-json\/wp\/v2\/pages\/362\/revisions\/374"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kdotportfolio\/wp-json\/wp\/v2\/media?parent=362"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}