{"id":305,"date":"2023-04-12T16:09:44","date_gmt":"2023-04-12T16:09:44","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/sblac\/?p=305"},"modified":"2023-04-12T16:09:44","modified_gmt":"2023-04-12T16:09:44","slug":"scada-systems","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/sblac\/2023\/04\/12\/scada-systems\/","title":{"rendered":"SCADA Systems"},"content":{"rendered":"\n<p><strong>BLUF(Bottom line up front)-<\/strong><br>What are the vulnerabilities with infrastructure systems and what role does the SCADA<br>take part in minimizing the threats? Threats with these types of systems are uncertified<br>admission and individuals sending messages to their devices can gain authority over it. In<br>this writing, I will go into further depth on these two topics.<br><strong>\u21e8Role of SCADA:<\/strong><br>SCADA stands for supervisory control and data acquisition, in which the systems are meant to<br>make sure the electricity, water, gas, as well as other systems are being provided and maintained.<br>It consists of computer systems, and its goal is to manage plus watches over the data.(SCADA<br>Systems, 2023)<br><strong>Vulnerabilities Associated:<\/strong><br>There are cyber threats that mess with the computer services. Some of the solutions that SCADA<br>utilizes are firewalls, as well as creating solutions that block access and application control to<br>prevent hackers from gaining access. (Biswas, 2022) So since the SCADA systems do use<br>protocols, they are automatically put at risk for more cyber threats.<br><strong>Conclusion:<\/strong><br>The overall system they use includes HMI, Data Control, PLC, and equipment (Dpstele,<br>2023). The communication networks help with connecting them to remote sites and they also use inputs.<br>Another thing they utilize are RTU\u2019s just to make sure everything is connecting &amp; processing the way it is supposed to. In conclusion, SCADA uses techniques to avoid attacks and people from breaking into their data and devices.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>BLUF(Bottom line up front)-What are the vulnerabilities with infrastructure systems and what role does the SCADAtake part in minimizing the threats? Threats with these types of systems are uncertifiedadmission and individuals sending messages to their devices can gain authority over it. Inthis writing, I will go into further depth on these two topics.\u21e8Role of SCADA:SCADA&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/sblac\/2023\/04\/12\/scada-systems\/\">Read More<\/a><\/div>\n","protected":false},"author":26126,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/sblac\/wp-json\/wp\/v2\/posts\/305"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/sblac\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/sblac\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sblac\/wp-json\/wp\/v2\/users\/26126"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sblac\/wp-json\/wp\/v2\/comments?post=305"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/sblac\/wp-json\/wp\/v2\/posts\/305\/revisions"}],"predecessor-version":[{"id":306,"href":"https:\/\/sites.wp.odu.edu\/sblac\/wp-json\/wp\/v2\/posts\/305\/revisions\/306"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/sblac\/wp-json\/wp\/v2\/media?parent=305"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sblac\/wp-json\/wp\/v2\/categories?post=305"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sblac\/wp-json\/wp\/v2\/tags?post=305"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}