{"id":363,"date":"2025-05-04T21:18:55","date_gmt":"2025-05-04T21:18:55","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/kdotportfolio\/?page_id=363"},"modified":"2025-05-04T21:26:10","modified_gmt":"2025-05-04T21:26:10","slug":"analytical-paper","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/kdotportfolio\/analytical-paper\/","title":{"rendered":"Analytical Paper"},"content":{"rendered":"\n<p>Kwabena Asumadu<br>05\/02\/2025<br>SCADA Systems and Tomorrow&#8217;s<br>Threat: A Long-Term View of<br>Cybersecurity in Critical Infrastructure<br>Introduction: Why SCADA Systems Are Important<br>SCADA systems are a vital part of the functioning of contemporary infrastructure.<br>Electricity grids, water systems, and transportation systems all utilize SCADA systems to<br>manage and monitor essential services. There is one huge problem, however\u2014most of these<br>systems were constructed years ago, with little thought given to cybersecurity. Now, as they<br>become networked, they are vulnerable to computer attacks that can have disastrous long-term<br>consequences.<br>In this essay, I address the long-term danger of continuing to use aging, vulnerable<br>SCADA systems. I use the philosophical model called *The Short Arm of Predictive<br>Knowledge* to illustrate how we are underestimating the future impact of today&#8217;s weak<br>protections. My belief is that if we don&#8217;t act now, we are betting on more than system failure\u2014<br>we are betting on public safety, national stability, and trust in technology itself.<br>SCADA System Vulnerabilities: What We Know<br>The majority of SCADA systems continue to operate on outdated technology and lack<br>strong defenses like encryption or adequate password protection. Inadequate patching practices,<br>outdated software, and human error are among the most prevalent risks to these systems, says the<br>Cybersecurity and Infrastructure Security Agency (CISA). These vulnerabilities provide hackers<br>with an easier path to enter and inflict harm.<br>We have real-world examples already showing how dangerous this is.<br>In 2021, a cyberattack intruded into the water treatment plant in Oldsmar, Florida, and<br>made an attempt to raise the levels of a harmful chemical in the water. Happily, it was caught<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>and foiled. But it leaves one wondering: what if it had succeeded? What if something similar<br>happened on a power grid or a railroad control center?<br>These are not just technical issues\u2014they can actually create emergencies that affect large<br>numbers of people.<br>The Short Arm of Predictive Knowledge: We Don&#8217;t See What&#8217;s Coming<br>The Short Arm of Predictive Knowledge explains that individuals and organizations tend<br>not to appreciate the long-term effects of emerging technologies. When it comes to SCADA<br>systems, this issue becomes highly pronounced. Because many of these systems still run on their<br>foundational levels today, decision-makers might not feel compelled to update or secure them.<br>Simply because something is functional today, nevertheless, doesn&#8217;t imply that it will be secure<br>tomorrow.<br>The largest danger in this case is that technology is exceeding our ability to secure it.<br>Cyber threats are becoming smarter, but our infrastructure systems simply stick to a given<br>configuration. If we persist with this approach, we could end up having catastrophic outcomes<br>across the next decade or so. These may range from economic meltdown due to blackout, to<br>environmental devastation due to contaminated water supply.<br>The longer we wait, the harder and more expensive these issues will be.<br>What Can Be Done Now to Minimize Future Risks?<br>To reduce the long-term risks, we have to implement changes now, however challenging<br>or expensive. Obsolete infrastructure needs to be replaced with modern counterparts having<br>strong cybersecurity provisions built-in. Training personnel to recognize threats is just as vital as<br>using cutting-edge technology. Minor weaknesses can give way to colossal attacks, and hence,<br>human error has to be addressed with as much seriousness as technical malfunction.<br>In addition, more policy is required. Business and government need to collaborate on<br>legislation that imposes a minimum amount of protection on any system that impinges on public<br>safety. It is not sound risk management to wait for a catastrophe to change things. By taking<br>action now, we can prevent far greater problems down the road.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Conclusion<br>SCADA systems are at the center of services we use daily. They are also, sadly, some of<br>the most exposed components of our infrastructure. Looking with the Short Arm of Predictive<br>Knowledge, it is clear that not addressing these threats now will only make things even worse<br>later. I know the problem is not easy. It costs money to upgrade aging systems. Some institutions<br>do not have the funds, the personnel, or even the knowledge to make the necessary changes. And<br>no system is ever fully secure, regardless of how robust the defenses. But that should not stop us<br>from doing what we can. The price of inaction will almost certainly be much greater. I believe<br>that if we act today with a vision for the future, we can build a safer and more stable<br>infrastructure. This means understanding our limits in predicting future threats but understanding<br>we have a responsibility to act anyway. We may not be able to anticipate every threat perhaps,<br>but we can certainly be far more prepared than we are now.<br>References:<br>Cybersecurity and Infrastructure Security Agency (CISA). \u201cIndustrial Control Systems.\u201d CISA,<br>https:\/\/www.cisa.gov\/topics\/industrial-control-systems.CISA<\/p>\n\n\n\n<p><br>Claroty. \u201cSCADA Risk Management: Protecting Critical Infrastructure.\u201d Claroty Blog,<br>https:\/\/claroty.com\/blog\/scada-risk-management-protecting-critical-infrastructure.<a href=\"https:\/\/www.cisa.gov\/topics\/industrial-control-systems\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.cisa.gov\/topics\/industrial-control-systems?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/sites.wp.odu.edu\/mikeisha-robinson\/2024\/11\/13\/understanding-scada-systems-and-their-role-in-critical-infrastructure-security\/\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/sites.wp.odu.edu\/mikeisha-robinson\/2024\/11\/13\/understanding-scada-systems-and-their-role-in-critical-infrastructure-security\/\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/sites.wp.odu.edu\/mikeisha-robinson\/2024\/11\/13\/understanding-scada-systems-and-their-role-in-critical-infrastructure-security\/\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/sites.wp.odu.edu\/mikeisha-robinson\/2024\/11\/13\/understanding-scada-systems-and-their-role-in-critical-infrastructure-security\/?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kwabena Asumadu05\/02\/2025SCADA Systems and Tomorrow&#8217;sThreat: A Long-Term View ofCybersecurity in Critical InfrastructureIntroduction: Why SCADA Systems Are ImportantSCADA systems are a vital part of the functioning of contemporary infrastructure.Electricity grids, water systems, and transportation systems all utilize SCADA systems tomanage and monitor essential services. There is one huge problem, however\u2014most of thesesystems were constructed years ago,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/kdotportfolio\/analytical-paper\/\">Read More<\/a><\/div>\n","protected":false},"author":28080,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kdotportfolio\/wp-json\/wp\/v2\/pages\/363"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kdotportfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kdotportfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kdotportfolio\/wp-json\/wp\/v2\/users\/28080"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kdotportfolio\/wp-json\/wp\/v2\/comments?post=363"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/kdotportfolio\/wp-json\/wp\/v2\/pages\/363\/revisions"}],"predecessor-version":[{"id":375,"href":"https:\/\/sites.wp.odu.edu\/kdotportfolio\/wp-json\/wp\/v2\/pages\/363\/revisions\/375"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kdotportfolio\/wp-json\/wp\/v2\/media?parent=363"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}