{"id":301,"date":"2024-12-02T04:27:50","date_gmt":"2024-12-02T04:27:50","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/latasha-redford\/?p=301"},"modified":"2024-12-02T04:27:52","modified_gmt":"2024-12-02T04:27:52","slug":"scada-systems","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/latasha-redford\/2024\/12\/02\/scada-systems\/","title":{"rendered":"SCADA Systems"},"content":{"rendered":"<div class=\"TextLayer-container\">\n<div class=\"textLayer\" style=\"text-align: center\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">An<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">y t<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ype of<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">security<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">&#8211;<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">based<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">systems<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">is<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">subjective to being<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">targeted<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">. SCADA is no<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">exc<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">eption.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">SCADA is<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">superviso<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ry co<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ntrol and data<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">acquisition<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Accordin<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">g t<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">o the S<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">CADA<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Systems<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">article,<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">it<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u201c<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ref<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">er<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">s to I<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">CS (I<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ndustrial control s<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ystems) used to control infrastruct<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ure<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">processes, facility<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">&#8211;<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">based processes, or industrial p<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">rocesses<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u201d<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">SCADA<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">systems all<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ow us<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ers<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">to make in<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">formative decisions<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">to make sure<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">the infrastructure<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">and operati<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ons<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ar<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">e safe.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">One<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">of the<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">biggest threats<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">is<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">access to soft<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ware that<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">wasn\u2019t<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">authorized<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">for anyone to<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">use<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">. Tha<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">t<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">can inclu<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">de persons<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">or com<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">puter viruse<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">s<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Data access to network<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">s<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">that<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">is sent to<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">SCADA<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">devices<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">is another threa<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">t<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">. Th<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ere is little to no secu<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">rity<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">with sending data<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">so<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">whatever person<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">t<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">h<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">at sends it<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">, has al<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">l control over it.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">VPN<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">is an option<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">that SCADA use<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">rs<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">believe<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">wi<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ll help<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">keep the<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">n<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">et<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">work<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">protected<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">, but at the same time<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">there are ways to bypass<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">the secu<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">rity<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ne<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">t<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">work on SCADA devices.<\/span><\/div>\n<div class=\"textLayer\" style=\"text-align: center\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">To<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">mi<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">tigate risks<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">and to protec<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">t from cyber threats<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">,<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">organizations<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">nee<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">d to<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">take on a<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">more cautious approach that involves<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u201c<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">threat intell<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">igence<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u201d<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">T<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">o<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">get a ho<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ld<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">of threat<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">intelligence,<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">organizations<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">can<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">be more prepared<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">and ahead of onc<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">oming threats. They are<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">also able to un<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">derstand the differ<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ent<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">strategies<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">used by<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">cybercriminals and<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">put in place<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">different<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">security measures.<\/span><\/div>\n<div class=\"textLayer\" style=\"text-align: center\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Dixon, M. (2024, October 27).<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">SCADA systems and Cyber Threats: A threat intelligence<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">approach<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">. CyberIntelInsights.com. https:\/\/www.cyberintelinsights.com\/industries\/scada<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">&#8211;<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">systems<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">&#8211;<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">cyber<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">&#8211;<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">threats<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">&#8211;<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">threat\/<\/span><\/div>\n<div class=\"textLayer\" style=\"text-align: center\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">SCADA systems<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">. SCADA Systems. (n.d.). https:\/\/www.scadasystems.net\/<\/span>\n<div class=\"endOfContent textLayer--absolute\">\u00a0<\/div>\n<\/div>\n<\/div>\n<div class=\"PDFAnnotationLayer-container\" style=\"text-align: center\">\u00a0<\/div>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Any type of security&#8211;based systems is subjective to being targeted. SCADA is noexception. SCADA is supervisory control and data acquisition. According to the SCADASystems article, it \u201crefers to ICS (Industrial control systems) used to control infrastructureprocesses, facility&#8211;based processes, or industrial processes\u201d. SCADA systems allow usersto make informative decisions to make sure the infrastructure and operations&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/latasha-redford\/2024\/12\/02\/scada-systems\/\">Read More<\/a><\/div>\n","protected":false},"author":29372,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/latasha-redford\/wp-json\/wp\/v2\/posts\/301"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/latasha-redford\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/latasha-redford\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/latasha-redford\/wp-json\/wp\/v2\/users\/29372"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/latasha-redford\/wp-json\/wp\/v2\/comments?post=301"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/latasha-redford\/wp-json\/wp\/v2\/posts\/301\/revisions"}],"predecessor-version":[{"id":303,"href":"https:\/\/sites.wp.odu.edu\/latasha-redford\/wp-json\/wp\/v2\/posts\/301\/revisions\/303"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/latasha-redford\/wp-json\/wp\/v2\/media?parent=301"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/latasha-redford\/wp-json\/wp\/v2\/categories?post=301"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/latasha-redford\/wp-json\/wp\/v2\/tags?post=301"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}