{"id":291,"date":"2026-05-03T23:58:27","date_gmt":"2026-05-03T23:58:27","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nariewhiting\/?p=291"},"modified":"2026-05-03T23:58:27","modified_gmt":"2026-05-03T23:58:27","slug":"scada-write-up","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/nariewhiting\/2026\/05\/03\/scada-write-up\/","title":{"rendered":"SCADA Write-up"},"content":{"rendered":"\n<p class=\"has-text-align-left\">Anariea Whiting<br>CYSE 200T<br>Professor Duvall<br>April 8, 2026<br><br>BLUF: SCADA is an industrial control system that utilizes specialized hardware like RTUs and<br>PLCs as well as communication infrastructure to monitor and coordinate a big range of<br>infrastructures like faculty, or industrial processes through a centralized supervisory system.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><strong>What is SCADA?<\/strong><br>SCADA stands for \u201cSupervisory Control and Data Acquisition\u201d. These systems are essential to a<br>wide range of industries and are broadly used for controlling and monitoring processes. They are<br>prominently used because they have the ability to control, monitor, and transmit data in a smart<br>and seamless manner.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><strong>SCADA Architectures<\/strong><br>The first generation of SCADA used independent mainframe computers that lacked outside<br>network connections. These systems depend on proprietary protocols and physical backup<br>mainframes to maintain control.<\/p>\n\n\n\n<p class=\"has-text-align-left\">The second generation used Local Area Networks to share real-time data across multiple<br>stations. This shift reduced equipment costs and spread processing tasks across a wider<br>network. <\/p>\n\n\n\n<p class=\"has-text-align-left\">The third generation connects systems to the internet using standard Wide Area Network<br>protocols like IP. While this connectivity increases potential cyber vulnerabilities, it also allows<br>for the application of modern, standardized security improvements.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><strong>SCADA Security Issues<\/strong><br>SCADA systems are high stakes to go for cyberwarfare because their failure could impair<br>essential services like water and electricity. Major vulnerabilities exist through unauthorized<br>software access and unsecure network protocols using specialized industrial firewalls and<br>whitelisting.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><strong>Conclusion<br><\/strong>In conclusion, SCADA is a centralized system used to monitor and coordinate critical<br>infrastructure like power and water through specialized hardware and softeware. While its<br>architecture has transitioned from being isolated from mainframes to networked internet<br>systems, it faces a significant cyber threat that requires specialized security like industrial<br>firewalls.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Anariea WhitingCYSE 200TProfessor DuvallApril 8, 2026 BLUF: SCADA is an industrial control system that utilizes specialized hardware like RTUs andPLCs as well as communication infrastructure to monitor and coordinate a big range ofinfrastructures like faculty, or industrial processes through a centralized supervisory system. What is SCADA?SCADA stands for \u201cSupervisory Control and Data Acquisition\u201d. These systems&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/nariewhiting\/2026\/05\/03\/scada-write-up\/\">Read More<\/a><\/div>\n","protected":false},"author":32195,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nariewhiting\/wp-json\/wp\/v2\/posts\/291"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nariewhiting\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nariewhiting\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nariewhiting\/wp-json\/wp\/v2\/users\/32195"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nariewhiting\/wp-json\/wp\/v2\/comments?post=291"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/nariewhiting\/wp-json\/wp\/v2\/posts\/291\/revisions"}],"predecessor-version":[{"id":292,"href":"https:\/\/sites.wp.odu.edu\/nariewhiting\/wp-json\/wp\/v2\/posts\/291\/revisions\/292"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nariewhiting\/wp-json\/wp\/v2\/media?parent=291"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nariewhiting\/wp-json\/wp\/v2\/categories?post=291"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nariewhiting\/wp-json\/wp\/v2\/tags?post=291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}