{"id":291,"date":"2026-04-20T03:37:44","date_gmt":"2026-04-20T03:37:44","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/meganbeard\/?p=291"},"modified":"2026-04-20T03:37:44","modified_gmt":"2026-04-20T03:37:44","slug":"scadas-security-methods","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/meganbeard\/2026\/04\/20\/scadas-security-methods\/","title":{"rendered":"SCADAs Security Methods"},"content":{"rendered":"\n<p>The SCADA systems play a huge role in the protection of basic needs for everyone. These systems, I don\u2019t think, should have any flaws in their security systems due to the importance of the resources involved. The US system back in 2010 was hacked, and that led to Homeland Security needing to step up the security measures. According to the SCADA systems document, one of the biggest weaknesses was the system packets that hold the SCADA devices within the network. The lack of security could lead to hackers gaining access to the networks these systems are based upon.&nbsp;<\/p>\n\n\n\n<p>According to (Info Checkpoint), the top vulnerability to SCADA is old software still being used within the security system. Through most of my research, I found that the people working within the systems can cause more issues depending on what they have access to. (Jim Schultz, Principal Consultant, Global Industrial Cybersecurity, Black &amp; Veatch, 2025) explains that more segments should be added to the system so the whole system can\u2019t be attacked by a minor leak. By discovering the vulnerabilities of the systems and fixing them before there is an issue, they could prevent possible future attacks. (Jim Schultz, Principal Consultant, Global Industrial Cybersecurity, Black &amp; Veatch, 2025) Also explained that the use of personal devices could help the system be better protected. I believe that phones on the same WIFI and systems as important systems like SCADA are a huge risk to the system.&nbsp;<\/p>\n\n\n\n<p>Jim Schultz, Principal Consultant, Global Industrial Cybersecurity, Black &amp; Veatch. (2025). 10 Practical Steps to Reduce SCADA Cybersecurity Risk. Nacwa.org.&nbsp;<a href=\"https:\/\/www.nacwa.org\/news-publications\/news-detail\/2024\/10\/17\/10-practical-steps-to-reduce-scada-cybersecurity-risk\">https:\/\/www.nacwa.org\/news-publications\/news-detail\/2024\/10\/17\/10-practical-steps-to-reduce-scada-cybersecurity-risk<\/a><\/p>\n\n\n\n<p>TOP 10 CRITICAL INFRASTRUCTURE AND SCADA\/ICS CYBERSECURITY VULNERABILITIES AND THREATS Operational Technology (OT) Systems Lack Basic Security Controls. Below Are the Most Common Threats: Vulnerabilities, Threats, Legacy Software, and Lack of Network Segmentation. (n.d.).&nbsp;<a href=\"https:\/\/www.checkpoint.com\/downloads\/products\/top-10-cybersecurity-vulnerabilities-threat-for-critical-infrastructure-scada-ics.pdf\">https:\/\/www.checkpoint.com\/downloads\/products\/top-10-cybersecurity-vulnerabilities-threat-for-critical-infrastructure-scada-ics.pdf<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The SCADA systems play a huge role in the protection of basic needs for everyone. These systems, I don\u2019t think, should have any flaws in their security systems due to the importance of the resources involved. The US system back in 2010 was hacked, and that led to Homeland Security needing to step up the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/meganbeard\/2026\/04\/20\/scadas-security-methods\/\">Read More<\/a><\/div>\n","protected":false},"author":25641,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/meganbeard\/wp-json\/wp\/v2\/posts\/291"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/meganbeard\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/meganbeard\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/meganbeard\/wp-json\/wp\/v2\/users\/25641"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/meganbeard\/wp-json\/wp\/v2\/comments?post=291"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/meganbeard\/wp-json\/wp\/v2\/posts\/291\/revisions"}],"predecessor-version":[{"id":292,"href":"https:\/\/sites.wp.odu.edu\/meganbeard\/wp-json\/wp\/v2\/posts\/291\/revisions\/292"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/meganbeard\/wp-json\/wp\/v2\/media?parent=291"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/meganbeard\/wp-json\/wp\/v2\/categories?post=291"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/meganbeard\/wp-json\/wp\/v2\/tags?post=291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}