{"id":312,"date":"2024-04-11T01:26:17","date_gmt":"2024-04-11T01:26:17","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/moore-moses\/?p=312"},"modified":"2024-04-11T01:26:17","modified_gmt":"2024-04-11T01:26:17","slug":"discussion-boards-and-write-ups-scada-systems-and-how-they-protect-critical-infrastructure-systems","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/moore-moses\/2024\/04\/11\/discussion-boards-and-write-ups-scada-systems-and-how-they-protect-critical-infrastructure-systems\/","title":{"rendered":"Discussion boards and Write ups: SCADA systems and how they protect critical infrastructure systems."},"content":{"rendered":"\n<p>Industrial control systems(ICS), help control infrastructure processes for various<br>industrial systems. For example, Architecture, networks, and platforms all have vulnerabilities.<br>This write-up will expose some of those vulnerabilities and explain how SCADA systems help<br>limit these problems.<br>Vulnerabilities<br>When looking at an infrastructure control system, you have many parts that are critical to<br>the functionality of the system. The architecture of the PCS is a critical part, it refers to the<br>control and data storage the system has. There must be a balance between human control and<br>automated control. If there isn&#8217;t a balance then the whole system relies on smaller entities with<br>limited human intervention. This helps the external networks of a system relay SCADA<br>messages to the support system operations. The platform does various things to this data like<br>storing and outputting PCS data. This whole system runs off on the architecture and<br>infrastructure and must maintain a balance between efficiency and security. SCADA is used to<br>control infrastructure processes for various industrial systems. Some examples include: waste<br>management, water treatment, gas stations, etc. Usually used to control centralized systems for<br>an entire area, or they can be spread over larger areas. Part of the SCADA system is the HMI or<br>human machine interface. This machine processes data and sends it to a human operator who<br>in turn uses this data to control processes. This information enters the SCADA database and is<br>used for logistic information, troubleshooting guides, and maintenance problems. This allows<br>the operator to see everything he or she needs to see, and is able to deactivate a certain area in<br>their work space if need be. Failure of a SCADA system is a very high cost, but these<br>components that build the system help keep the system running smoothly even if failure<br>happens thanks to the backup software it contains.<br>Conclusion<br>There are many vulnerabilities in a system, the architecture of the PCS sets a foundation<br>for the entire system. One major vulnerability in this system is the balance between human and<br>automation. Too much human control can be a problem when our knowledge is at a limit, but<br>too much control can be bad from a non sentient being. SCADA systems help relay this data<br>from the automation to the human operator and allow them to see what they need to control.<br>Even when systems fail SCADA has backup hardware it automatically switches to, ensuring<br>nothing is interrupted by the failure.<\/p>\n\n\n\n<p>SCADA systems. SCADA Systems. (n.d.). https:\/\/www.scadasystems.net\/<br>Stamp, J., Dillinger, J., Young, W., &amp; DePoy, J. (2003). COMMON VULNERABILITIES IN<br>CRITICAL INFRASTRUCTURE CONTROL SYSTEMS , 1\u201314.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Industrial control systems(ICS), help control infrastructure processes for variousindustrial systems. For example, Architecture, networks, and platforms all have vulnerabilities.This write-up will expose some of those vulnerabilities and explain how SCADA systems helplimit these problems.VulnerabilitiesWhen looking at an infrastructure control system, you have many parts that are critical tothe functionality of the system. The architecture of&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/moore-moses\/2024\/04\/11\/discussion-boards-and-write-ups-scada-systems-and-how-they-protect-critical-infrastructure-systems\/\">Read More<\/a><\/div>\n","protected":false},"author":28600,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/moore-moses\/wp-json\/wp\/v2\/posts\/312"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/moore-moses\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/moore-moses\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/moore-moses\/wp-json\/wp\/v2\/users\/28600"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/moore-moses\/wp-json\/wp\/v2\/comments?post=312"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/moore-moses\/wp-json\/wp\/v2\/posts\/312\/revisions"}],"predecessor-version":[{"id":313,"href":"https:\/\/sites.wp.odu.edu\/moore-moses\/wp-json\/wp\/v2\/posts\/312\/revisions\/313"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/moore-moses\/wp-json\/wp\/v2\/media?parent=312"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/moore-moses\/wp-json\/wp\/v2\/categories?post=312"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/moore-moses\/wp-json\/wp\/v2\/tags?post=312"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}