{"id":322,"date":"2024-12-03T20:55:56","date_gmt":"2024-12-03T20:55:56","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/?page_id=322"},"modified":"2024-12-03T20:59:53","modified_gmt":"2024-12-03T20:59:53","slug":"scada-writeup","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/scada-writeup\/","title":{"rendered":"Scada writeup"},"content":{"rendered":"\n<p>Will Demarest 10\/20\/24<\/p>\n\n\n\n<p><strong>SCADA Systems and Critical Infrastructure<\/strong><\/p>\n\n\n\n<p>SCADA systems need appropriate Cybersecurity protections because they are used to monitor and control critical infrastructure.<\/p>\n\n\n\n<p><strong>What are SCADA systems?<\/strong><\/p>\n\n\n\n<p>SCADA stands for supervisory control and data acquisition. These systems are used to monitor and control various processes in critical infrastructure (electricity, gas pipelines, water &amp; sewer, etc.).&nbsp; For example, at a water treatment facility there would be sensors to monitor the water pressure inside the pipes. The sensors would then send information to an Human machine interface. If the water pressure gets too high or too low, the sensors send out an alert.<\/p>\n\n\n\n<p><strong>What can go wrong?<\/strong><\/p>\n\n\n\n<p>While critical infrastructure is vulnerable to direct physical threats, these systems require frequent maintenance and anything that interferes with that maintenance occurring when it needs to could have major consequences.&nbsp; I&#8217;m continuing the example from above.&nbsp; If a hacker is able to tamper with the sensors. They can possibly turn off the alarms for the water pressure. When the water pressure in the pipes are unstable they can rupture the pipes and can cause localized damage&nbsp;<\/p>\n\n\n\n<p><strong>How can SCADA systems be protected?<\/strong><\/p>\n\n\n\n<p>Software updates, Physical security, etc\u2026<\/p>\n\n\n\n<p>Any outdated hardware needs to be replaced with new hardware&nbsp;<\/p>\n\n\n\n<p>Employees need to be trained in cybersecurity.&nbsp;<\/p>\n\n\n\n<p>Work cited page<\/p>\n\n\n\n<figure class=\"wp-block-embed\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/www.scadasystems.net\/\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-tuxcare wp-block-embed-tuxcare\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"nkQR05OZk8\"><a href=\"https:\/\/tuxcare.com\/blog\/5-cybersecurity-weaknesses-critical-infrastructure-owners-should-guard-against\/\">5 Cybersecurity Weaknesses Critical Infrastructure Owners Should Guard Against<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;5 Cybersecurity Weaknesses Critical Infrastructure Owners Should Guard Against&#8221; &#8212; TuxCare\" src=\"https:\/\/tuxcare.com\/blog\/5-cybersecurity-weaknesses-critical-infrastructure-owners-should-guard-against\/embed\/#?secret=d2Yiuftho0#?secret=nkQR05OZk8\" data-secret=\"nkQR05OZk8\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/publicsafety.ieee.org\/topics\/cybersecurity-of-critical-infrastructure-with-ics-scada-systems\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Will Demarest 10\/20\/24 SCADA Systems and Critical Infrastructure SCADA systems need appropriate Cybersecurity protections because they are used to monitor and control critical infrastructure. What are SCADA systems? SCADA stands for supervisory control and data acquisition. These systems are used to monitor and control various processes in critical infrastructure (electricity, gas pipelines, water &amp; sewer,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/scada-writeup\/\">Read More<\/a><\/div>\n","protected":false},"author":29645,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/wp-json\/wp\/v2\/pages\/322"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/wp-json\/wp\/v2\/users\/29645"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/wp-json\/wp\/v2\/comments?post=322"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/wp-json\/wp\/v2\/pages\/322\/revisions"}],"predecessor-version":[{"id":329,"href":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/wp-json\/wp\/v2\/pages\/322\/revisions\/329"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/wp-json\/wp\/v2\/media?parent=322"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}