{"id":296,"date":"2026-05-03T17:09:15","date_gmt":"2026-05-03T17:09:15","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nicholascline\/?p=296"},"modified":"2026-05-03T17:09:15","modified_gmt":"2026-05-03T17:09:15","slug":"scada-systems","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/nicholascline\/2026\/05\/03\/scada-systems\/","title":{"rendered":"SCADA Systems"},"content":{"rendered":"\n<p class=\"has-text-align-center\">Critical Infrastructure and SCADA.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br>BLUF: SCADA is essential in protecting Critical Infrastructure, by encrypting data,<br>monitoring devices and systems, and minimizing insider threat.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br>What is SCADA?<br>Supervisory Control &amp; Data Acquisition (SCADA) is a system that consist of<br>hardware and software and is primarily used in the industrial industry. SCADA allows these<br>industries to manage their equipment and data remotely. The hardware of SCADA works in<br>tandem with the software by gathering and sending data from Remote Terminal Units (RTU)<br>and Programable Logic Controllers (PLC) to a computer that already has the SCADA<br>software installed (SCADA Systems).<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br>Vulnerabilities in our Critical Infrastructure.<br>While Critical Infrastructure is essential for most of our country to run and<br>live, there is some large vulnerabilities. One of which is most of these systems still<br>use a legacy system, meaning that the systems that is running our nations water,<br>power, and electricity, are using 5\u201310-year-old systems. Another is remote access,<br>while this seems like it would be a wonderful thing to have, if its not properly<br>secured, it is extremely easy to breach (Lee, 2025). However, one of the large pest<br>threats to our Critical Infrastructure is insider threats, it has been reported that in<br>2023 over 77% of these organizations reported a rise in insider threats (Bridewell,<br>2023).<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br>Threat mitigation using SCADA.<br>We can never fully eliminate the risk that comes with Critical Infrastructure, we can<br>mitigate it. Using SCADA and its processes allows for real time monitoring of all critical<br>systems and reports if an irregular pattern occurs. As well as encrypting data that is being<br>transmitted remotely, this also includes integrity checking. Denying any and all data that<br>does not match what was originally sent. For insider threats, cameras, security guards,<br>and device monitoring can be used, if a person contently feels they are being watched. It is<br>unlikely that they will commit what ever damage or theft they intended to do.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br>Conclusion<br>In conclusion, SCADA is essential to protecting the nations critical infrastructure,<br>by mitigating not only digital, but physical threats. This is accomplished by constant<br>monitoring, proper encryption, and adequate physical security.<\/p>\n\n\n\n<p>Works Cited.<br>Bridewell. (2023, May 15). Insider threats surge across US critical infrastructure as 77% under<br>increasing fire from within. https:\/\/www.bridewell.com\/us\/insights\/news\/detail\/insider-<br>threats-surge-across-us-critical-infrastructure-as-77-under-increasing-fire-from-within<br>Lee, R. (2025, October 13). The weakness in Global Critical Infrastructure Cybersecurity.<br>World Economic Forum. https:\/\/www.weforum.org\/stories\/2025\/10\/dangerous-blindspot-<br>in-infrastructure-cybersecurity\/#:~:text=\u2019-<br>,Critical%20infrastructure%2C%20including%20electric%20grids%2C%20water%20treat<br>ment%20facilities%2C%20transportation,when%20it%20comes%20to%20cybersecurity.<br>SCADA Systems. (n.d.).<br>https:\/\/docs.google.com\/document\/d\/1VnMlL2YmcW5Jg4MdDa1dt5fJpmQM0KVH\/edit#<br>heading=h.ui3hrj86p5ml<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Critical Infrastructure and SCADA. BLUF: SCADA is essential in protecting Critical Infrastructure, by encrypting data,monitoring devices and systems, and minimizing insider threat. What is SCADA?Supervisory Control &amp; Data Acquisition (SCADA) is a system that consist ofhardware and software and is primarily used in the industrial industry. SCADA allows theseindustries to manage their equipment and data&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/nicholascline\/2026\/05\/03\/scada-systems\/\">Read More<\/a><\/div>\n","protected":false},"author":32191,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nicholascline\/wp-json\/wp\/v2\/posts\/296"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nicholascline\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nicholascline\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nicholascline\/wp-json\/wp\/v2\/users\/32191"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nicholascline\/wp-json\/wp\/v2\/comments?post=296"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/nicholascline\/wp-json\/wp\/v2\/posts\/296\/revisions"}],"predecessor-version":[{"id":297,"href":"https:\/\/sites.wp.odu.edu\/nicholascline\/wp-json\/wp\/v2\/posts\/296\/revisions\/297"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nicholascline\/wp-json\/wp\/v2\/media?parent=296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nicholascline\/wp-json\/wp\/v2\/categories?post=296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nicholascline\/wp-json\/wp\/v2\/tags?post=296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}