{"id":296,"date":"2024-11-17T22:35:46","date_gmt":"2024-11-17T22:35:46","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/?p=296"},"modified":"2024-11-17T22:35:46","modified_gmt":"2024-11-17T22:35:46","slug":"critical-infrastructure-vulnerabilities-and-scada","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/2024\/11\/17\/critical-infrastructure-vulnerabilities-and-scada\/","title":{"rendered":"Critical Infrastructure Vulnerabilities and SCADA"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"366\" height=\"199\" src=\"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/wp-content\/uploads\/sites\/37241\/2024\/11\/image-1.png\" alt=\"\" class=\"wp-image-300\" style=\"width:700px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/wp-content\/uploads\/sites\/37241\/2024\/11\/image-1.png 366w, https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/wp-content\/uploads\/sites\/37241\/2024\/11\/image-1-300x163.png 300w\" sizes=\"(max-width: 366px) 100vw, 366px\" \/><\/figure>\n\n\n\n<p><strong>A Functioning Society<\/strong><br>  Critical infrastructure refers to the systems that are holding up a functional society and<br>keeping the system running.  \u201cThere are 16 critical infrastructure sectors whose assets,<br>systems, and networks, whether physical or virtual, are considered so vital to the United<br>States that their incapacitation or destruction would have a debilitating effect on security,<br>national economic security, national public health or safety, or any combination thereof<br>(CISA 2024).\u201d  These sectors include chemical sector, commercial facilities sector,<br>communications sector, critical manufacturing sector, dams sector, defense industrial base<br>sector, emergency services sector, energy sector, financial services sector, food and<br>agriculture sector, government services and facilities sector, healthcare and public health<br>sector, information technology sector, nuclear reactors, materials, waste sectors,<br>transportation sector, and water\/wastewater systems sector.  These systems are<br>considered \u201ccritical\u201d due to the high importance and need for functionality of a society.<br><\/p>\n\n\n\n<p><strong>VULNERABILITIES TO CRITICAL INFRASTRUCTURE<\/strong><br>  These systems are vulnerable to a multitude of threats to protect against. These threats<br>include:<br><strong>CYBER ATTACKS:<\/strong> Malware, denial of service, data breaches, ransomware are all forms of<br>cyber attacks which can disrupt, damage, or steal sensitive data and information.  Cyber<br>attacks are becoming more advanced.<br><strong>PHYSICAL THREATS:<\/strong> Natural disasters and terrorist attacks pose a significant threat due to<br>power outages, earthquakes, electrical disturbances, and then the damage to facilities and<br>its personnel through terrorist activity.<br><strong>INSIDER THREATS:<\/strong> The personnel working part of the critical infrastructure also pose a<br>threat due to poor training or workplace deviance.<br><strong>OUTDATED TECHNOLOGY:<\/strong> Many systems in the critical infrastructure still use outdated<br>technology or software which put them at risk for attacks due to the lack of proper security<br>protocols.<br><\/p>\n\n\n\n<p><strong>THE ROLE OF SCADA<\/strong><br>  SCADA or supervisory controls and data acquisitions, \u201csystems are used for controlling,<br>monitoring, and analyzing industrial devices and processes (SCADA-International 2024).\u201d<br>SCADA helps mitigate these vulnerabilities that threaten critical infrastructure.<br>SCADA mitigates these threats through what is called HMI or human machine interfaces<br>that present information to operators on a graphical screen.  From the HMI an operator<br>has control over automated processes, remotely manages operations, collects equipment<br>data during operation, logs all processes and operations, and general monitoring of<br>systems.  Also a major component of SCADA systems is the capability of quick time incident<br>response.  The SCADA system can aid in a speedy response time to casualties detected<br>within allowing time for operators to correct the situation before it worsens. Implementing<br>and maintaining SCADA systems is crucial for the safe operation and security of critical<br>infrastructure.  A lack of proper SCADA system protocols can pose serious vulnerabilities to<br>critical infrastructure.<br><br><strong>References<br><\/strong>Critical Infrastructure security agency (2024, November 3). Critical Infrastructures Sectors.<br>CISA.gov. Retrieved November 3, 2024, from<br>https:\/\/www.cisa.gov\/topics\/critical-infrastructure-security-and-resilience\/critical-infrastruct<br>ure-sectors<br>SCADA-International (2024, November 3). What is SCADA? Retrieved November 3, 2024,<br>from<br>https:\/\/scada-international.com\/what-is-scada\/#:~:text=Supervisory%20Control%20and%20<br>Data%20Acquisition,them%20without%20being%20on%20site.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A Functioning Society Critical infrastructure refers to the systems that are holding up a functional society andkeeping the system running. \u201cThere are 16 critical infrastructure sectors whose assets,systems, and networks, whether physical or virtual, are considered so vital to the UnitedStates that their incapacitation or destruction would have a debilitating effect on security,national economic security,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/2024\/11\/17\/critical-infrastructure-vulnerabilities-and-scada\/\">Read More<\/a><\/div>\n","protected":false},"author":29794,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/wp-json\/wp\/v2\/posts\/296"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/wp-json\/wp\/v2\/users\/29794"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/wp-json\/wp\/v2\/comments?post=296"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/wp-json\/wp\/v2\/posts\/296\/revisions"}],"predecessor-version":[{"id":301,"href":"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/wp-json\/wp\/v2\/posts\/296\/revisions\/301"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/wp-json\/wp\/v2\/media?parent=296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/wp-json\/wp\/v2\/categories?post=296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/wp-json\/wp\/v2\/tags?post=296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}