{"id":171,"date":"2026-02-11T13:04:59","date_gmt":"2026-02-11T13:04:59","guid":{"rendered":"https:\/\/wp.odu.edu\/odupresentationtemplate\/?p=171"},"modified":"2026-04-19T12:18:40","modified_gmt":"2026-04-19T12:18:40","slug":"hello-world","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/mailanijjonesthornton\/2026\/02\/11\/hello-world\/","title":{"rendered":"Critical Infrastructure Vulnerabilities and the Role of SCADA Systems in Reducing those Risks"},"content":{"rendered":"\n<p>BLUF<\/p>\n\n\n\n<p>The integration of computer networks with physical infrastructure like power<br>grids increases the risk of cyberattacks. Organizations must utilize Supervisory Control<br>and Data Acquisition (SCADA) systems to monitor operations and provide the rapid<br>response capabilities necessary to maintain public safety.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Critical Infrastructure Vulnerabilities<\/p>\n\n\n\n<p>Critical infrastructure includes systems people rely on every day, such as electricity,<br>transportation and manufacturing. Many of these systems run on industrial control<br>systems (ICS) and older operational technology that was originally designed to prioritize<br>reliability and availability instead of cybersecurity (NIST, 2023). As these systems<br>become increasingly interconnected and dependent on the internet, they have become<br>increasingly vulnerable to threats like insufficient network isolation and unauthorized<br>remote access.<\/p>\n\n\n\n<p>Some common vulnerabilities include outdated software and weak authentication. When<br>attackers exploit these weaknesses, they may be able to access systems that control physical infrastructure. According to the Cybersecurity and Infrastructure Security<br>Agency (CISA), cyber incidents involving industrial control systems can disrupt essential<br>services like electricity, water distribution and transportation systems. For example, the<br>2021 Colonial Pipeline ransomware attack caused a fuel shortage across the U.S. and<br>showed how cyberattacks can impact critical infrastructure (CISA, 2023).<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Role of SCADA Systems<\/p>\n\n\n\n<p>SCADA systems help organize, monitor, and manage industrial processes across large<br>facilities and infrastructure networks. These systems collect data from sensors and<br>devices such as remote terminal units (RTUs) and programmable logic controllers<br>(PLCs), then send that data to a central system where operators can view it through a<br>human interface (HMI) (SCADA Systems, n.d.)<br>By providing live updates on critical infrastructure operations, SCADA allows operators<br>to detect unusual activity, such as equipment failure or a cyberattack immediately. This<br>allows organizations to respond faster and prevent small discrepancies from turning into<br>larger disruptions.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Conclusion<\/p>\n\n\n\n<p>Overall, critical infrastructure systems face serious cybersecurity risks because they<br>connect digital data networks to real-world systems. SCADA systems reduce these risks<br>by providing better visibility and control. When combined with strong authentication and<br>constant monitoring, SCADA systems improve the security and stability of critical<br>infrastructure.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>BLUF The integration of computer networks with physical infrastructure like powergrids increases the risk of cyberattacks. Organizations must utilize Supervisory Controland Data Acquisition (SCADA) systems to monitor operations and provide the rapidresponse capabilities necessary to maintain public safety. Critical Infrastructure Vulnerabilities Critical infrastructure includes systems people rely on every day, such as electricity,transportation and manufacturing&#8230;. <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/mailanijjonesthornton\/2026\/02\/11\/hello-world\/\">Read More<\/a><\/div>\n","protected":false},"author":31921,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/mailanijjonesthornton\/wp-json\/wp\/v2\/posts\/171"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/mailanijjonesthornton\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/mailanijjonesthornton\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mailanijjonesthornton\/wp-json\/wp\/v2\/users\/31921"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mailanijjonesthornton\/wp-json\/wp\/v2\/comments?post=171"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/mailanijjonesthornton\/wp-json\/wp\/v2\/posts\/171\/revisions"}],"predecessor-version":[{"id":214,"href":"https:\/\/sites.wp.odu.edu\/mailanijjonesthornton\/wp-json\/wp\/v2\/posts\/171\/revisions\/214"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/mailanijjonesthornton\/wp-json\/wp\/v2\/media?parent=171"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mailanijjonesthornton\/wp-json\/wp\/v2\/categories?post=171"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mailanijjonesthornton\/wp-json\/wp\/v2\/tags?post=171"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}