{"id":299,"date":"2025-04-28T03:17:24","date_gmt":"2025-04-28T03:17:24","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ncybersite\/?p=299"},"modified":"2025-04-28T03:17:24","modified_gmt":"2025-04-28T03:17:24","slug":"write-up-scada-systems","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/ncybersite\/2025\/04\/28\/write-up-scada-systems\/","title":{"rendered":"Write-Up &#8211; SCADA Systems"},"content":{"rendered":"\n<p>Name: Noel Mcfee cyse200<br>Title: SCADA Systems and Critical Infrastructure Security<br>BLUF: This report examines vulnerabilities associated with SCADA systems in<br>critical infrastructure and outlines the role of SCADA applications in mitigating<br>cybersecurity risks through monitoring, automation, and security enhancements.<br>SCADA systems control many extensive applications in energy, water, and<br>transportation, for example, such critical infrastructure (STEMS.net 2024). Many<br>SCADA systems are networked, yet such networking can create vulnerabilities where<br>these systems become targeted by adversarial attacks that disrupt operations severely.<br>There are several SCADA systems under development; hence, for the security of the<br>systems and the protection of national security, accounting for the possibility of cyber-<br>attacks becomes crucial.<br>SCADA System Vulnerabilities<br>SCADA systems are vulnerable to modern cyber threats because they were not initially<br>built with cybersecurity in mind (STEMS.net 2024). SCADA systems, for example,<br>operate on legacy networks that do not have encryption over long periods (Industrial<br>Cyber, 2024).Many SCADA systems still operate without any protective cover.<br>Furthermore, remote control access has increased over the years, further exposing<br>what could be accessed by unauthorized personnel (STEMS.net, 2024). Additionally,<br>SCADA systems are vulnerable because of network segmentation weaknesses<br>(Industrial Cyber, 2024). For instance, if a SCADA system is improperly segmented, an<br>intruder can gain access to one area of the network and move laterally and affect<br>adjacent operations One specific example is the 2015 cyber attack on the Ukraine<br>power grid, where attackers exploited the SCADA system by breaching it and<br>successfully shutting down the power for thousands (Zetter, 2016). In addition, SCADA<br>systems are vulnerable to different cybersecurity exploits than distributed control<br>systems (DCS). SCADA systems are more likely to be hacked due to the widespread<br>transportation and energy vulnerabilities that will attract more cyber criminals (Industrial<br>Cyber, 2024). With DCS, the vulnerabilities are more about abusing the control features<br>inside one specific commercial or manufacturing enterprise (Industrial Cyber, 2024).<br>What&#8217;s coming for SCADA in the future involves cybersecurity support integration such<br>as with firewalls and IDS for more unauthorized entry detection (STEMS.net, 2024). In<br>addition, more recent SCADA technologies incorporate encryption, role-based access<br>control, and even anomaly detection algorithms to secure critical infrastructure.<br>Furthermore, organizational standards going forward relative to SCADA include proper<br>system patches, cybersecurity awareness and training, and better network<br>segmentation (Industrial Cyber, 2024). These things exist to reduce susceptibility.<br>SCADA without them will always be susceptible to a cyber attack.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Name: Noel Mcfee cyse200Title: SCADA Systems and Critical Infrastructure SecurityBLUF: This report examines vulnerabilities associated with SCADA systems incritical infrastructure and outlines the role of SCADA applications in mitigatingcybersecurity risks through monitoring, automation, and security enhancements.SCADA systems control many extensive applications in energy, water, andtransportation, for example, such critical infrastructure (STEMS.net 2024). ManySCADA systems are&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ncybersite\/2025\/04\/28\/write-up-scada-systems\/\">Read More<\/a><\/div>\n","protected":false},"author":29935,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ncybersite\/wp-json\/wp\/v2\/posts\/299"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ncybersite\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ncybersite\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ncybersite\/wp-json\/wp\/v2\/users\/29935"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ncybersite\/wp-json\/wp\/v2\/comments?post=299"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/ncybersite\/wp-json\/wp\/v2\/posts\/299\/revisions"}],"predecessor-version":[{"id":300,"href":"https:\/\/sites.wp.odu.edu\/ncybersite\/wp-json\/wp\/v2\/posts\/299\/revisions\/300"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ncybersite\/wp-json\/wp\/v2\/media?parent=299"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ncybersite\/wp-json\/wp\/v2\/categories?post=299"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ncybersite\/wp-json\/wp\/v2\/tags?post=299"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}