{"id":526,"date":"2024-12-01T22:37:54","date_gmt":"2024-12-01T22:37:54","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/kylie-henley\/?p=526"},"modified":"2024-12-01T22:40:12","modified_gmt":"2024-12-01T22:40:12","slug":"scada-systems","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/kylie-henley\/2024\/12\/01\/scada-systems\/","title":{"rendered":"SCADA Systems"},"content":{"rendered":"\n<p><em>Critical infrastructure systems are facilities and assets that are critical to the functionality of<br>society. Supervisory Control and Data Acquisition (SCADA) systems control, monitor, and analyze<br>industrial, facility-based, and industrial systems.<\/em><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Vulnerabilities of SCADA Systems<\/h2>\n\n\n\n<p>Although SCADA systems improve the efficiency of critical infrastructure systems, it also<br>introduces vulnerabilities that attackers exploit. Like all other systems, they are vulnerable to<br>cyber-attacks, which can allow the attacker to take control of the system. Another vulnerability is the lack of monitoring. <\/p>\n\n\n\n<p>Suspicious activity or reacting in time of a cyber-attack are often missed due to SCADA systems lacking an active network system along with using outdated equipment and\/or software. Lastly, SCADA systems are connected through the internet, leaving it more vulnerable to cyber-attacks.<\/p>\n\n\n\n<p><br>Below are some examples of the vulnerabilities online systems may face. <\/p>\n\n\n\n<p>Imagine you have wireless cameras throughout your home, like most people do nowadays.<br>Having wireless cameras can lead you vulnerable to someone hacking into your system,<br>watching you and your family. Some hackers do this to know when you will be out of the house<br>and then using that knowledge to then break into your home to steal your belongings.<\/p>\n\n\n\n<p><br>Another example of this is how cybercriminals hack into airport systems to shut down their<br>systems, which then leads to multiple issues with pilots and everyone else within the airport.<br>Cybercriminals may hack airports to gain individuals passport\/ID info to either steal their<br>information or to sell it along with spear-phishing campaigns.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Mitigating Risks with SCADA applications<\/h2>\n\n\n\n<p>SCADA system applications are used to warn the operators of questionable issues by sounding<br>the alarms along with alerting the operators if a large number of errors accrue, allowing operators<br>to resolve the problem as quickly as possible.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>In conclusion, our society relies heavily on critical infrastructure systems to provide essential<br>services. Using SCADA systems with the right policies and procedures in place help ensure the<br>security of critical infrastructure systems. Therefore, it is vital to protect this system to ensure<br>things run smoothly.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">References<\/h2>\n\n\n\n<p>SCADA Systems \u2013 SCADA Systems. (2018, July 25). SCADA<br>Systems. <a href=\"http:\/\/www.scadasystems.net\/\">http:\/\/www.scadasystems.net\/<\/a><\/p>\n\n\n\n<p><br>SCADA systems and their vulnerabilities (1997-2024) SecPoint<br><a href=\"https:\/\/www.secpoint.com\/scada-systems-their-\nvulnerabilities.html#:~:text=Common%20SCADA%20System%20Vulnerabilities,a%20cyber%20att\nack%20does%20happen.\">https:\/\/www.secpoint.com\/scada-systems-their-<br>vulnerabilities.html#:~:text=Common%20SCADA%20System%20Vulnerabilities,a%20cyber%20att<br>ack%20does%20happen.<\/a><a href=\"http:\/\/www.scadasystems.net\/\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.secpoint.com\/scada-systems-their-vulnerabilities.html#:~:text=Common%20SCADA%20System%20Vulnerabilities,a%20cyber%20attack%20does%20happen\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.secpoint.com\/scada-systems-their-vulnerabilities.html#:~:text=Common%20SCADA%20System%20Vulnerabilities,a%20cyber%20attack%20does%20happen\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Critical infrastructure systems are facilities and assets that are critical to the functionality ofsociety. Supervisory Control and Data Acquisition (SCADA) systems control, monitor, and analyzeindustrial, facility-based, and industrial systems. Vulnerabilities of SCADA Systems Although SCADA systems improve the efficiency of critical infrastructure systems, it alsointroduces vulnerabilities that attackers exploit. Like all other systems, they are&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/kylie-henley\/2024\/12\/01\/scada-systems\/\">Read More<\/a><\/div>\n","protected":false},"author":29373,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":6},"categories":[6],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kylie-henley\/wp-json\/wp\/v2\/posts\/526"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kylie-henley\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kylie-henley\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kylie-henley\/wp-json\/wp\/v2\/users\/29373"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kylie-henley\/wp-json\/wp\/v2\/comments?post=526"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/kylie-henley\/wp-json\/wp\/v2\/posts\/526\/revisions"}],"predecessor-version":[{"id":529,"href":"https:\/\/sites.wp.odu.edu\/kylie-henley\/wp-json\/wp\/v2\/posts\/526\/revisions\/529"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kylie-henley\/wp-json\/wp\/v2\/media?parent=526"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kylie-henley\/wp-json\/wp\/v2\/categories?post=526"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kylie-henley\/wp-json\/wp\/v2\/tags?post=526"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}