{"id":282,"date":"2022-12-08T12:47:53","date_gmt":"2022-12-08T12:47:53","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/richardbattle02\/?p=282"},"modified":"2022-12-08T12:47:56","modified_gmt":"2022-12-08T12:47:56","slug":"scada-systems","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/richardbattle02\/2022\/12\/08\/scada-systems\/","title":{"rendered":"SCADA Systems"},"content":{"rendered":"\n<p>Explaining Vulnerabilities and Role of SCADA applications <br>Scada is a combination of hardware and software used in enabling the <br>automation of industrial processes by capturing Operational technology real time <br>data such as valves, motors or pumps. Many of their vulnerabilities come from <br>software issues while lack of security capabilities are their main problems. SCADA <br>is tied with many vital things human use such as shipping, electricity generation <br>and many others. Vulnerabilities in SCADA system could allow encrypted coding <br>to cause power grids, energy providers, healthcare databases, national defenses <br>and others to result in catastrophic real-world chaos. They should have security <br>detailed around clock 24\/7 to monitor the systems while also having some type of <br>infrastructure alarm for various reasons for whether that may be water leak <br>power outage at certain point. Also have parameters\/ procedures set in place for <br>what to do if a certain security issue comes upon and to know how to handle it <br>and take accountability. Everyone on the security team should have a very specific <br>role to minimize any confusion and have fast responders to whatever may occur <br>at any time. Last, we should add maintenance schedules to look at all <br>infrastructure to make sure everything in place looks over things, make sure <br>nothing out of the ordinary or old things that may need maintenance or replacing, <br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Explaining Vulnerabilities and Role of SCADA applications Scada is a combination of hardware and software used in enabling the automation of industrial processes by capturing Operational technology real time data such as valves, motors or pumps. Many of their vulnerabilities come from software issues while lack of security capabilities are their main problems. SCADA is&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/richardbattle02\/2022\/12\/08\/scada-systems\/\">Read More<\/a><\/div>\n","protected":false},"author":25564,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/richardbattle02\/wp-json\/wp\/v2\/posts\/282"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/richardbattle02\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/richardbattle02\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/richardbattle02\/wp-json\/wp\/v2\/users\/25564"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/richardbattle02\/wp-json\/wp\/v2\/comments?post=282"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/richardbattle02\/wp-json\/wp\/v2\/posts\/282\/revisions"}],"predecessor-version":[{"id":290,"href":"https:\/\/sites.wp.odu.edu\/richardbattle02\/wp-json\/wp\/v2\/posts\/282\/revisions\/290"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/richardbattle02\/wp-json\/wp\/v2\/media?parent=282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/richardbattle02\/wp-json\/wp\/v2\/categories?post=282"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/richardbattle02\/wp-json\/wp\/v2\/tags?post=282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}