{"id":293,"date":"2024-04-22T00:05:16","date_gmt":"2024-04-22T00:05:16","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/marcus-rushing-1\/?p=293"},"modified":"2024-04-22T00:05:16","modified_gmt":"2024-04-22T00:05:16","slug":"scada-write-up","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/marcus-rushing-1\/2024\/04\/22\/scada-write-up\/","title":{"rendered":"SCADA Write up"},"content":{"rendered":"\n<p>Marcus. Rushing<br><br>What is SCADA?<br>     SCADA is an ICS (industrial control system) that coordinates the infrastructure system in<br>real-time. The SCADA system is a tagbase data system that takes all the data elements called<br>tags or points, these points can be hard or soft. Hard points are the input and output of the<br>system. Whereas the soft points are the results of different math and logic operations applied<br>these points usually are stored as time values. Some examples of these systems are water<br>treatments, gas pipelines, and wind farms.<br>SCADA\u2019s vulnerabilities<br>     Elieser stated that the SCADA system \u2018was built without security considerations\u2019 which is the<br>cause of the SCADA vulnerabilities . This is due to the architecture not having the security<br>measures due to not involving security in the process of making the SCADA system. Two forms<br>of vulnerability that come from these issues are Lack of input validation and Buffer overflow. The<br>process of a buffer overflow in the SCADA system happens when inputs are not verified or<br>checked properly, then if the buffer size is smaller than the input it leads to a buffer overflow.<br>The second vulnerability is lack of input validation, which is where SCADA software receives<br>inputs from other places or components and the software does not validate these inputs; this<br>affects the hardware and the software of the SCADA system which can lead to other<br>vulnerabilities in the system. These are just 2 out of a handful of vulnerabilities the SCADA has.<br>How to mitigate<br>   The SCADA system does have some vulnerabilities but 2 ways to mitigate them are integrity<br>checks and input validation. According to Eliser, the first way of mitigation is integrity checks<br>which would help prevent attacks that are aimed at making the system crash from DOS and<br>DDOS attacks. According to Eliser also the other form of mitigation is input validation. This is<br>due to using a white list approach which will account for all data types and the amount of data<br>and its structure of their data interjected into the SCADA application or software.<br>Conclusion<br>   In conclusion, the SCADA system is an ICL that coordinates the infrastructure systems<br>in real time and has a decent amount of vulnerability as buffer overflows and lack of input<br>validation. These vulnerabilities are present because the system wasn&#8217;t made with security in<br>mind when being made. There are ways to mitigate these problems such as integrity checks<br>and input validation through white list. The SCADA system is a system that helps keep the<br>production and operation of infrastructures running more smoothly. It has vulnerabilities that are<br>being worked on to become less of a problem while helping keep the systems of infrastructures<br>running<\/p>\n\n\n\n<p>work cited.<\/p>\n\n\n\n<p>Work cited.<br>Ltd., viElseer. \u201cSCADA Vulnerabilities and Attacks: A Review of the State\u2010of\u2010the\u2010art and<br>Open Issues.\u201d Computers &amp; Security, Elsevier Advanced Technology, 25 Nov.<br>2022, www.sciencedirect.com\/science\/article\/pii\/S0167404822004205#sec0032.<br>\u201cSCADA Systems.\u201d SCADA Systems, www.scadasystems.net\/. Accessed 24 Mar. 2024.<\/p>\n\n\n\n<p> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Marcus. Rushing What is SCADA? SCADA is an ICS (industrial control system) that coordinates the infrastructure system inreal-time. The SCADA system is a tagbase data system that takes all the data elements calledtags or points, these points can be hard or soft. Hard points are the input and output of thesystem. Whereas the soft points&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/marcus-rushing-1\/2024\/04\/22\/scada-write-up\/\">Read More<\/a><\/div>\n","protected":false},"author":28612,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/marcus-rushing-1\/wp-json\/wp\/v2\/posts\/293"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/marcus-rushing-1\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/marcus-rushing-1\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/marcus-rushing-1\/wp-json\/wp\/v2\/users\/28612"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/marcus-rushing-1\/wp-json\/wp\/v2\/comments?post=293"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/marcus-rushing-1\/wp-json\/wp\/v2\/posts\/293\/revisions"}],"predecessor-version":[{"id":294,"href":"https:\/\/sites.wp.odu.edu\/marcus-rushing-1\/wp-json\/wp\/v2\/posts\/293\/revisions\/294"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/marcus-rushing-1\/wp-json\/wp\/v2\/media?parent=293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/marcus-rushing-1\/wp-json\/wp\/v2\/categories?post=293"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/marcus-rushing-1\/wp-json\/wp\/v2\/tags?post=293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}