{"id":221,"date":"2026-04-27T01:55:35","date_gmt":"2026-04-27T01:55:35","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ntm1794\/?p=221"},"modified":"2026-04-27T01:55:35","modified_gmt":"2026-04-27T01:55:35","slug":"scada-and-ics-systems","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/ntm1794\/2026\/04\/27\/scada-and-ics-systems\/","title":{"rendered":"SCADA and ICS Systems"},"content":{"rendered":"\n<p>Nicholas T. Martin&nbsp;<\/p>\n\n\n\n<p>Professor Hiser&nbsp;<\/p>\n\n\n\n<p>CYSE \u2013 200&nbsp;<\/p>\n\n\n\n<p>9 April 2026&nbsp;<\/p>\n\n\n\n<p><strong>SCADA&nbsp;and ICS&nbsp;Systems:&nbsp;Vulnerabilities and Mitigation Tactics<\/strong>&nbsp;<\/p>\n\n\n\n<p><strong>BLUF:&nbsp;<\/strong>This brief&nbsp;memo aims to define Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS)&nbsp;technologies, their necessity in critical infrastructure,&nbsp;the&nbsp;inherent vulnerabilities to&nbsp;malicious actors, and some&nbsp;strategies&nbsp;to mitigate these risks.&nbsp;<\/p>\n\n\n\n<p><strong>SCADA and ICS<\/strong>&nbsp;<\/p>\n\n\n\n<p>According to a recent article from Fortinet,&nbsp;Industrial Control Systems (ICS)&nbsp;is an umbrella term for&nbsp;tools&nbsp;that are used to&nbsp;automate and control industrial systems. Some examples of these&nbsp;include&nbsp;Programmable Logic Controllers (PLC),&nbsp;Distributed Control Systems (DCS), and Remote Terminal Units (RTU)&nbsp;(Fortinet, n.d.).&nbsp;Another variant which falls under this umbrella is Supervisory Control and Data Acquisition (SCADA), which are specific tools used to centrally&nbsp;monitor&nbsp;and control&nbsp;a variety of ICS applications in large industrial settings. SCADA systems provide industrial operators with updates, real-time metrics, and alerts&nbsp;in the event of&nbsp;system malfunctions.&nbsp;<\/p>\n\n\n\n<p><strong>Vulnerabilities<\/strong>&nbsp;<\/p>\n\n\n\n<p>A key issue with many ICS technologies, including SCADA systems, is that many of them were developed years ago and were intended to be used in offline applications.&nbsp;As&nbsp;stated&nbsp;in the article linked with this assignment, many of these systems have since been connected to networks&nbsp;so that they may be&nbsp;operated&nbsp;remotely (Using SCADA to Protect Critical Infrastructure and Systems, n.d.).&nbsp;This has resulted in often outdated, legacy devices being connected&nbsp;to the broader internet, and&nbsp;introduced&nbsp;potential malicious strategies they were never designed to be subjected to.&nbsp;Since SCADA systems often provide industrial operators with a central access point to view and control other ICS devices, they are a&nbsp;favored&nbsp;target for malicious actors.&nbsp;Many of these systems control critical industrial plants and other infrastructures, and so it is often the case that device replacement and\/or updates are not an option.&nbsp;<\/p>\n\n\n\n<p><strong>Mitigation<\/strong>&nbsp;<\/p>\n\n\n\n<p>It is a misconception to believe that SCADA applications can mitigate risks of other ICS devices. In fact,&nbsp;it is paradoxical to say because SCADA is an ICS application itself.&nbsp;Though there are measures which can be taken to strengthen the defense of these systems.&nbsp;The previously mentioned&nbsp;Fortinet article provides some key strategies:&nbsp;<\/p>\n\n\n\n<ul>\n<li>Network Segmentation \u2013 Where possible, it is ideal to isolate critically outdated ICS devices from broader&nbsp;networks, or&nbsp;contain&nbsp;local networks to secure&nbsp;facilities (i.e., power plants, water treatment centers, etc.)&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul>\n<li>Access Control Measures \u2013 By implementing role-based access controls and least privileges, it is possible to&nbsp;limit access to ICS applications and prevent authorized access from unsecure accounts.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul>\n<li>Monitoring and Detection \u2013 If ICS devices are connected to local networks,&nbsp;it is recommended to implement Intrusion Detection\/Prevention Systems (IDS\/IPS) to&nbsp;monitor&nbsp;network traffic and prevent unauthorized access from unknown devices and networks.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul>\n<li>Strong Authentication \u2013 Utilizing Multi-Factor Authentication (MFA) systems as well as effective password policies often prevents malicious access through brute force techniques.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul>\n<li>Backup Storage \u2013 In the event of a cyberattack or other disaster, regularly updated backups provide critical infrastructure facilities with the means to restore data and return their systems to full functionality.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul>\n<li>Physical Security&nbsp;\u2013 Locks, guards, CCTV cameras, and other means of physical security bolster the defense of industrial facilities and prevent malicious actors from gaining access to ICS devices and local networks.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>(Fortinet, n.d.)&nbsp;<\/p>\n\n\n\n<p><strong>Conclusion<\/strong>&nbsp;<\/p>\n\n\n\n<p>As&nbsp;stated&nbsp;before, many industrial facilities do not have the&nbsp;option&nbsp;to replace or update outdated ICS devices, and these devices are often too critical to fully&nbsp;discontinue&nbsp;use. This means that some inherent&nbsp;risks&nbsp;will&nbsp;always be present.&nbsp;Though there are several methods to mitigate these vulnerabilities and lessen the risk of compromise. ICS devices are&nbsp;utilized&nbsp;in our most critical industries, including nuclear power, water treatment, and manufacturing centers. It is vital to safeguard these essential devices&nbsp;from both state-sponsored and criminal cyberattacks.&nbsp;<\/p>\n\n\n\n<p><strong>References<\/strong>&nbsp;<\/p>\n\n\n\n<p>Fortinet. (n.d.).&nbsp;<em>ICS SCADA: Strengthening OT security<\/em>. Fortinet Cybersecurity Glossary.&nbsp;<a href=\"https:\/\/www.fortinet.com\/resources\/cyberglossary\/ics-scada\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.fortinet.com\/resources\/cyberglossary\/ics-scada<\/a>&nbsp;&nbsp;<\/p>\n\n\n\n<p>Using SCADA to Protect Critical Infrastructure and Systems (n.d.)&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nicholas T. Martin&nbsp; Professor Hiser&nbsp; CYSE \u2013 200&nbsp; 9 April 2026&nbsp; SCADA&nbsp;and ICS&nbsp;Systems:&nbsp;Vulnerabilities and Mitigation Tactics&nbsp; BLUF:&nbsp;This brief&nbsp;memo aims to define Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS)&nbsp;technologies, their necessity in critical infrastructure,&nbsp;the&nbsp;inherent vulnerabilities to&nbsp;malicious actors,&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/ntm1794\/2026\/04\/27\/scada-and-ics-systems\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":31982,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ntm1794\/wp-json\/wp\/v2\/posts\/221"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ntm1794\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ntm1794\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ntm1794\/wp-json\/wp\/v2\/users\/31982"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ntm1794\/wp-json\/wp\/v2\/comments?post=221"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/ntm1794\/wp-json\/wp\/v2\/posts\/221\/revisions"}],"predecessor-version":[{"id":222,"href":"https:\/\/sites.wp.odu.edu\/ntm1794\/wp-json\/wp\/v2\/posts\/221\/revisions\/222"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ntm1794\/wp-json\/wp\/v2\/media?parent=221"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ntm1794\/wp-json\/wp\/v2\/categories?post=221"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ntm1794\/wp-json\/wp\/v2\/tags?post=221"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}