{"id":298,"date":"2025-11-21T18:39:19","date_gmt":"2025-11-21T18:39:19","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/krisraesmith\/?p=298"},"modified":"2025-11-21T18:39:21","modified_gmt":"2025-11-21T18:39:21","slug":"scada-systems","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/krisraesmith\/2025\/11\/21\/scada-systems\/","title":{"rendered":"SCADA Systems"},"content":{"rendered":"What is SCADA?<br \/>Scada stands for Supervisory Control and Data Acquisition. This is in reference to the<br \/>industrial control systems for infrastructures like water treatment plants, gas pipelines or power<br \/>generation plants. In simpler form, these are systems that are in control over large scale sites with<br \/>these infrastructures. Most of the functions are automatically controlled.<br \/>Vulnerabilities with SCADA<br \/>Many things in this world change over time to keep up with modern technology trends.<br \/>However, many SCADA systems have not. These are very important systems in these<br \/>infrastructures, however they do hold many vulnerabilities within. With technologies rapidly<br \/>growing in complexity everyday, this allows and opens up these systems to different threats and<br \/>cyber attacks, that might not have been there years ago.<br \/>Security Issues<br \/>There seems to be a large misunderstanding that all SCADA systems are very secure<br \/>because of lack of cyber connection. This is incorrect. There are so many different systems<br \/>within the system that operators think are very secure, however, being connected with external<br \/>networks for data storage or maintenance, allows for so many different threats and cyber attacks<br \/>to be more common and easily accessed by hackers.<br \/>Encryption &amp; Authentication<br \/>Most of these systems are decades old and probably need some updating. A big<br \/>vulnerability is authentication issues. One of the most major threats is unauthorized access to<br \/>these systems. This could refer to humans, viruses or infections within and then hackers of<br \/>course. Many of these systems are very outdated and need a lot of updates to keep up with the<br \/>ever changing IT world. Hackers who are able to reach within SCADA systems could gain<br \/>access to all kinds of data. They could change safety measures or software updates. It could also<br \/>cause a complete shut down of the system and could possibly even cause physical harm to those<br \/>around these facilities.<br \/>Mitigation of these Vulnerabilities<br \/>As with any type of technology system or anything else in the IT world, it comes along<br \/>with many risks and vulnerabilities to hackers and cyber attacks. Some items that have been put<br \/>into place to try to decrease and\/or eliminate as many breaches as possible are protocols, VPNs<br \/>and firewalls, updated authentication process and limiting access or monitoring it more in depth.<br \/>Firewalls are used to help encryption for how data is transmitted throughout the system without<br \/>any possible leaking of special information. It is also used to try to redirect those who are not<br \/>authenticated to access such data. Multi-factor functions have also been seen more now than<br \/>before. This also almost guarantees that whoever is trying to access data is permitted to do so.<br \/>Conclusion<br \/>Scada systems are a huge part of the infrastructure world although they come with risks<br \/>just as everything else does, especially in the cyber world of things. There has been a huge<br \/>process over the years though, of trying to avoid as many vulnerabilities to these systems as<br \/>possible. As mentioned above, with the implementation of protocols, multi-factor<br \/>authentications, updated systems and networks, it has helped with the vulnerabilities that<br \/>SCADA systems carry. Maintaining protection for these systems is essential for these<br \/>infrastructures to continue to run on a safe level and keep up with modern life.<br \/>References<br \/>SCADA Systems Concepts. (n.d.). Supervisory Control and Data Acquisition (SCADA) systems<br \/>overview.<br \/>Alanazi, M., Mahmood, A., &amp; Chowdhury, M. J. M. (2023). SCADA vulnerabilities and attacks:<br \/>A review of the state-of-the-art and open issues. Computers &amp; Security, 125, Article 103028.<br \/>https:\/\/doi.org\/10.1016\/j.cose.2022.103028","protected":false},"excerpt":{"rendered":"<p>What is SCADA?Scada stands for Supervisory Control and Data Acquisition. This is in reference to theindustrial control systems for infrastructures like water treatment plants, gas pipelines or powergeneration plants. In simpler form, these are systems that are in control over large scale sites withthese infrastructures. Most of the functions are automatically controlled.Vulnerabilities with SCADAMany things&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/krisraesmith\/2025\/11\/21\/scada-systems\/\">Read More<\/a><\/div>\n","protected":false},"author":31450,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/krisraesmith\/wp-json\/wp\/v2\/posts\/298"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/krisraesmith\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/krisraesmith\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/krisraesmith\/wp-json\/wp\/v2\/users\/31450"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/krisraesmith\/wp-json\/wp\/v2\/comments?post=298"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/krisraesmith\/wp-json\/wp\/v2\/posts\/298\/revisions"}],"predecessor-version":[{"id":300,"href":"https:\/\/sites.wp.odu.edu\/krisraesmith\/wp-json\/wp\/v2\/posts\/298\/revisions\/300"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/krisraesmith\/wp-json\/wp\/v2\/media?parent=298"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/krisraesmith\/wp-json\/wp\/v2\/categories?post=298"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/krisraesmith\/wp-json\/wp\/v2\/tags?post=298"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}