{"id":292,"date":"2025-10-17T02:20:00","date_gmt":"2025-10-17T02:20:00","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/michelle-smith\/?p=292"},"modified":"2025-10-17T02:20:00","modified_gmt":"2025-10-17T02:20:00","slug":"scada-systems","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/michelle-smith\/2025\/10\/17\/scada-systems\/","title":{"rendered":"SCADA Systems"},"content":{"rendered":"\n<p><br>     Supervisory control and data acquisition, or SCADA, is a system that monitors and protects critical infrastructure processes against internal and external threats. The biggest threats against the SCADA system are unauthorized access and unsecure packets.<br>Introduction<br>     SCADA&#8217;s main purpose is to monitor and control critical infrastructure processes. This system is only used in processes that require real time monitoring and updates, processes like infrastructure, facility, and industrial. SCADA systems work alongside critical infrastructure because of the benefits provided by its complex and efficient abilities. Because critical infrastructures are widely used, the vulnerabilities it faces must be mitigated by the SCADA systems.<br>Critical Infrastructure Systems Vulnerabilities<br>     Critical infrastructure vulnerabilities are protected by SCADA\u2019s ability to assess and mitigate threats. Some of the vulnerabilities found in these systems are outdated software, lack of encryption, and weak defenses. These vulnerabilities give hackers the chance to interfere with work, which could cause important services to be unavailable. The security needed to protect critical infrastructure led to the installment of SCADA systems.<br>SCADA Applications<br>     SCADA is a complex tool created to combat cyber threats and plays a major part in modern cyber defenses. One defense that SCADA has is real time monitoring, which maintains efficiency in infrastructure systems. Constant monitoring raises the chance of catching a threat before it causes a problem within a system. Another defense used in SCADA is RTU and HMI, which is used for communication and information exchange. SCADA applications are designed to mitigate threats against critical infrastructure systems.<br>Conclusion<br>     Critical infrastructure needs to have up to date software and proper defenses in order to have less vulnerabilities. SCADA is a tool that was created to mitigate the amounts of threats a system faces during daily operations and processes.<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Supervisory control and data acquisition, or SCADA, is a system that monitors and protects critical infrastructure processes against internal and external threats. The biggest threats against the SCADA system are unauthorized access and unsecure packets.Introduction SCADA&#8217;s main purpose is to monitor and control critical infrastructure processes. This system is only used in processes that require&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/michelle-smith\/2025\/10\/17\/scada-systems\/\">Read More<\/a><\/div>\n","protected":false},"author":31476,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/michelle-smith\/wp-json\/wp\/v2\/posts\/292"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/michelle-smith\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/michelle-smith\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/michelle-smith\/wp-json\/wp\/v2\/users\/31476"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/michelle-smith\/wp-json\/wp\/v2\/comments?post=292"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/michelle-smith\/wp-json\/wp\/v2\/posts\/292\/revisions"}],"predecessor-version":[{"id":298,"href":"https:\/\/sites.wp.odu.edu\/michelle-smith\/wp-json\/wp\/v2\/posts\/292\/revisions\/298"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/michelle-smith\/wp-json\/wp\/v2\/media?parent=292"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/michelle-smith\/wp-json\/wp\/v2\/categories?post=292"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/michelle-smith\/wp-json\/wp\/v2\/tags?post=292"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}