{"id":321,"date":"2025-12-09T03:25:06","date_gmt":"2025-12-09T03:25:06","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/robynbrown\/?p=321"},"modified":"2025-12-09T03:25:06","modified_gmt":"2025-12-09T03:25:06","slug":"vulnerabilities-associated-with-scada-incritical-infrastructure","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/robynbrown\/2025\/12\/09\/vulnerabilities-associated-with-scada-incritical-infrastructure\/","title":{"rendered":"Vulnerabilities Associated with SCADA incritical Infrastructure"},"content":{"rendered":"\n<p><br><\/p>\n\n\n\n<p>This write up explains how SCADA systems support our critical infrastructure while also showing where vulnerable. My main point is that even though SCADA technology was not originally built with cybersecurity in mind, it still plays a major role in reducing risks by giving operators real time visibility alarms, and control over essential processes.<br><strong>Vulnerabilities<\/strong><br>When I look at how critical systems work such as, water plants, power stations, traffic lights, and gas pipelines. Its alarming how vulnerable those examples really are. Alot of SCADA systems were bult years ago, way before cybersecurity became a major issue. People assumed that if equipment was locked in a room, it would be safe. Many of these systems do not have strong passwords, encryptions, or modern security features built in using this logic.<br>As technology evolved, these systems started getting connected to bigger networks and even the internet. Being connected to the internet complicates things. Many protocols like, Modbus and DNP3 were never designed with security in mind, so checks are not made about who is sending the commands to the systems. Meaning if anyone gets into the network they can access valve positions, turn valves, and fake sensor readings.<br>Human mistakes add to this involving the workers using weak passwords, skipping updates, or plugging in unsecured devices. Real life examples are the Florida water plant incident where someone was almost able to poison the water supply because systems were not protected. This example shows that SCADA environments in critical infrastructure can be easy targets if they are not secure.<br><strong>How SCADA Applications Help Reduce These Risk<\/strong><br>Even though SCADA systems have weaknesses, they are still extremely important for keeping everything safe and running smoothly. The biggest strength of SCADA is visibility. These systems collect real time data for sensors and equipment to show operators updates in real time. Quick responses can prevent serious damage or even save lives.<br>Modern SCADA systems are becoming more secure too. Many now updated protocols such as firewalls, VPNs ,and network segmentation so outsiders cannot just jump in and control equipment. The historical data and logging features also help detect unusual patterns that might indicate someone is trying to tamper with the system. Some systems even have backups to prevent system failures.<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><br>Overall SCADA is not perfect, but when it is properly secured and monitored, it can help reduce risk by giving organizations visibility, alarms, data, and backup protection. It becomes a tool so experts can catch problems early whether they are technical failures or possible cyber attacks.<\/p>\n\n\n\n<p><strong>References<\/strong><br>Cybersecurity and Infrastructure Security Agency (CISA). Cybersecurity Best Practices for Industrial Control Systems(ICShttps:\/\/www.cisa.gov\/sites\/default\/files\/publications\/Cybersecurity_Best_Practices_for_Industrial_Control_Systems_508.pdf \u201cWhat is SCADA? Supervisory Control and Data Acquisition\u201d from Inductive Automation. https:\/\/inductiveautomation.com\/resources\/article\/what-is-scada<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This write up explains how SCADA systems support our critical infrastructure while also showing where vulnerable. My main point is that even though SCADA technology was not originally built with cybersecurity in mind, it still plays a major role in reducing risks by giving operators real time visibility alarms, and control over essential processes.VulnerabilitiesWhen I&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/robynbrown\/2025\/12\/09\/vulnerabilities-associated-with-scada-incritical-infrastructure\/\">Read More<\/a><\/div>\n","protected":false},"author":31350,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/robynbrown\/wp-json\/wp\/v2\/posts\/321"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/robynbrown\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/robynbrown\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/robynbrown\/wp-json\/wp\/v2\/users\/31350"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/robynbrown\/wp-json\/wp\/v2\/comments?post=321"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/robynbrown\/wp-json\/wp\/v2\/posts\/321\/revisions"}],"predecessor-version":[{"id":322,"href":"https:\/\/sites.wp.odu.edu\/robynbrown\/wp-json\/wp\/v2\/posts\/321\/revisions\/322"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/robynbrown\/wp-json\/wp\/v2\/media?parent=321"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/robynbrown\/wp-json\/wp\/v2\/categories?post=321"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/robynbrown\/wp-json\/wp\/v2\/tags?post=321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}