{"id":295,"date":"2022-12-04T16:59:49","date_gmt":"2022-12-04T16:59:49","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/mholl017\/?p=295"},"modified":"2022-12-04T16:59:59","modified_gmt":"2022-12-04T16:59:59","slug":"scada-systems-write-up","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/mholl017\/2022\/12\/04\/scada-systems-write-up\/","title":{"rendered":"SCADA Systems Write-up"},"content":{"rendered":"\n<p>SCADA refers to ICS (industrial control systems) used to control infrastructure processes (water<br>treatment, wastewater treatment, gas pipelines, wind farms, etc), facility-based processes (airports, space stations, ships, etc,) or industrial processes (production, manufacturing, refining, power generation, etc) (Staff e edit).SCADA was introduced in the 1970\u2019s, in which the internet wasn\u2019t a common thing in the modern world. People didn\u2019t ever think technology would get as advanced as it is today. <\/p>\n\n\n\n<p>Once the internet was being built, more of our crucial framework of computers were being set up. SCADA is a very old system which holds a lot of information and anyone in the world can log into a SCADA computer. The internet holds a kind of connection to other humans that we were craving so we dug deeper into the internet to make everything more accessible to everyone around the world. The internet soon began to run<br>itself and find ways to connect everything to anyone. SCADA is crucial to any facility based process and is important to control these infrastructure processes. For example, anyone can hack into a system and turn off a viable source of anything in order to mess with a country or target the heart of a country, the people. There\u2019s been multiple examples of these types of hacking, like in 2015, it was the first known cyber attack that was successful in cutting a power grid across thousands of Ukrainians, called the Ukraine Power Grid. It left thousands without electricity<br>for up to 6 hours. This can happen anywhere in the world at any time if someone wants to hack our<br>systems and they know how to do it, they could access very confidential, important things that can affect millions of people. <\/p>\n\n\n\n<p>The SCADA system isn\u2019t a very fast or easy system either, many devices currently, are way faster than SCADA. There\u2019s many viruses that can be created to block workers from detecting a threat or even from stopping a hacking threat which makes it very hard to prevent a cyber attack. The main premise of SCADA is to protect and monitor our very crucial information and infrastructure processes that are most important to us in our everyday lives. Although, the security of SCADA is not as good as it seems, because it is an easy target for cyber terrorism or attacks.<\/p>\n\n\n\n<p>References:<\/p>\n\n\n\n<p>Staff, Editorial, et al. \u201cWhat Is SCADA ? How Does SCADA Works ?: Applications of SCADA.\u201d<br>Inst Tools, 4 Mar. 2021, https:\/\/instrumentationtools.com\/overview-of-scada-system\/.<br>\u201c14 Major SCADA Attacks and What You Can Learn from Them.\u201d 14 Major SCADA Hacks,<br>https:\/\/www.dpstele.com\/blog\/major-scada-hacks.php.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>SCADA refers to ICS (industrial control systems) used to control infrastructure processes (watertreatment, wastewater treatment, gas pipelines, wind farms, etc), facility-based processes (airports, space stations, ships, etc,) or industrial processes (production, manufacturing, refining, power generation, etc) (Staff e edit).SCADA was introduced in the 1970\u2019s, in which the internet wasn\u2019t a common thing in the modern&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/mholl017\/2022\/12\/04\/scada-systems-write-up\/\">Read More<\/a><\/div>\n","protected":false},"author":24986,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/mholl017\/wp-json\/wp\/v2\/posts\/295"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/mholl017\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/mholl017\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mholl017\/wp-json\/wp\/v2\/users\/24986"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mholl017\/wp-json\/wp\/v2\/comments?post=295"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/mholl017\/wp-json\/wp\/v2\/posts\/295\/revisions"}],"predecessor-version":[{"id":296,"href":"https:\/\/sites.wp.odu.edu\/mholl017\/wp-json\/wp\/v2\/posts\/295\/revisions\/296"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/mholl017\/wp-json\/wp\/v2\/media?parent=295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mholl017\/wp-json\/wp\/v2\/categories?post=295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mholl017\/wp-json\/wp\/v2\/tags?post=295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}