{"id":296,"date":"2025-12-06T00:08:00","date_gmt":"2025-12-06T00:08:00","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/lanaghan-dent\/?p=296"},"modified":"2025-12-06T00:08:00","modified_gmt":"2025-12-06T00:08:00","slug":"critical-infrastructure-and-how-scada-helps-mitigate-its-risk","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/lanaghan-dent\/2025\/12\/06\/critical-infrastructure-and-how-scada-helps-mitigate-its-risk\/","title":{"rendered":"Critical infrastructure and how SCADA helps mitigate its risk"},"content":{"rendered":"\n<p><strong>INTRO<\/strong><br>Critical infrastructure systems encompass an energy grid of interconnected platforms, including power<br>generation and water treatment. The problem with this energy grid is that it is vulnerable to cyber attacks.<br>Critical infrastructure has become increasingly vulnerable every day. With the development of PLCs or<br>programmable logic controller, it has become easier to hack into someone&#8217;s critical infrastructure and take<br>over their system. All it takes is an embedded code on web browsers, and it can even be accessed through<br>web browsers. SCADA, or Supervisory Control and Data Acquisition, helps with this problem. Known for being able to spread across large area&#8217;s SCADA would control and monitor entire<br>sites. One of the biggest things SCADA has that makes it different is that, if you want to restrict access to<br>the host control function, then you would have to have supervisory control or basic override. This would<br>make it difficult for the hackers to take over your system fully.<\/p>\n\n\n\n<p><strong>Vulnerability\u2019s<\/strong><br>Intro<br>When it comes to critical infrastructure, many vulnerabilities could be exploited. This could lead<br>to your system being corrupted, and even in the worst case, completely taken away from you.<br>Vulnerability protection is so important when it comes to critical infrastructure because it is<br>Evolving every year, there are even new vulnerabilities being added in the past few years.<\/p>\n\n\n\n<p><strong>PLC Malware\/Network Exposure<\/strong><br>The newest vulnerability found in 2024, the PLC is placed on a web server, and if you interact<br>with said web server, someone could gain complete control of your system, as well as the<br>physical process controls. This is possible due to the recent change in how software is used to<br>monitor and control systems. This big change made it so that the management is \u201cweb-based.\u201d<\/p>\n\n\n\n<p><strong>Stuxnet Computer Virus\/Supply Chain Risk<\/strong><br>One if not the most famous computer viruses in the world, Stuxnet, was used on Iranian nuclear<br>facilities and was taken and changed to attack SCADA systems. Stuxnet was used to take control<br>of a PLC in a system and to take control of the rest of the system from there. This was used on<br>the Iranians to damage nuclear material and was used in Germany to shut down and damage a<br>steel mill. This is a Supply Chain Risk because of the fact that the virus comes from a third party.<br>That third party is the US.<\/p>\n\n\n\n<p><strong>Weak Authentication\/Dated Software<\/strong><br>When researching this topic, I couldn\u2019t help but recognize how much of a problem weak<br>authentication is when it comes to critical infrastructure. The CISA, or the Cybersecurity and<br>The Infrastructure Security Agency describes strong authentication as \u201cnot enforced.\u201d Further saying<br>that the software for critical infrastructure isn\u2019t up to date. This could cause a \u201cdenial of service.\u201d<br>attack, which pretty much locks you out of your system. This could also lead to your cloud being<br>unprotected, one of the biggest targets for cyber attacks. Allowing your sensitive data to be<br>taken.<\/p>\n\n\n\n<p><strong>SCADA Helps Mitigate<\/strong><br>SCADA would help address these different vulnerabilities in similar ways. The best way<br>SCADA would help you mitigate these vulnerabilities through the HMI. This would allow you<br>to see important information like your diagnosis and management information in your database.<br>This allows you to stop the infection of malware and viruses on your computer as fast as<br>possible. This would also allow you to see your dated and outdated software if you know what<br>you&#8217;re doing. Overall, understanding critical infrastructure and how SCADA could help mitigate<br>the risk of vulnerability to infection could be key to protecting your critical infrastructure.<br><\/p>\n\n\n\n<p><strong>Citations:<\/strong><br>1. https:\/\/docs.google.com\/document\/d\/1VnMlL2YmcW5Jg4MdDa1dt5fJpmQM0KVH\/edit<br>2. Allianz Commercial. (2016, June). Cyber attacks on critical infrastructure.<br>https:\/\/commercial.allianz.com\/news-and-insights\/expert-risk-articles\/cyber-attacks-on-critical-inf<br>rastructure.html<br>3. Stewart, J. (2024, February 29). Critical infrastructure systems are vulnerable to a new kind of<br>cyberattack. Georgia Institute of Technology, College of Engineering.<br>https:\/\/coe.gatech.edu\/news\/2024\/02\/critical-infrastructure-systems-are-vulnerable-new-kind-cyb<br>erattack<br>4. CISA. (2022, May 17). Weak security controls and practices routinely exploited for initial access<br>(Alert AA22\u2011137A). U.S. Department of Homeland Security.<br>https:\/\/www.cisa.gov\/sites\/default\/files\/publications\/AA22-137A_Weak_Security_Controls_and_<br>Practices_Routinely_Exploited_for_Initial_Access.pdf<br>5. Grammarly. (2025). Grammarly [Software]. Grammarly, Inc. https:\/\/www.grammarly.com<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>INTROCritical infrastructure systems encompass an energy grid of interconnected platforms, including powergeneration and water treatment. The problem with this energy grid is that it is vulnerable to cyber attacks.Critical infrastructure has become increasingly vulnerable every day. With the development of PLCs orprogrammable logic controller, it has become easier to hack into someone&#8217;s critical infrastructure and&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/lanaghan-dent\/2025\/12\/06\/critical-infrastructure-and-how-scada-helps-mitigate-its-risk\/\">Read More<\/a><\/div>\n","protected":false},"author":31593,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/lanaghan-dent\/wp-json\/wp\/v2\/posts\/296"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/lanaghan-dent\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/lanaghan-dent\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/lanaghan-dent\/wp-json\/wp\/v2\/users\/31593"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/lanaghan-dent\/wp-json\/wp\/v2\/comments?post=296"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/lanaghan-dent\/wp-json\/wp\/v2\/posts\/296\/revisions"}],"predecessor-version":[{"id":299,"href":"https:\/\/sites.wp.odu.edu\/lanaghan-dent\/wp-json\/wp\/v2\/posts\/296\/revisions\/299"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/lanaghan-dent\/wp-json\/wp\/v2\/media?parent=296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/lanaghan-dent\/wp-json\/wp\/v2\/categories?post=296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/lanaghan-dent\/wp-json\/wp\/v2\/tags?post=296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}