{"id":287,"date":"2023-04-17T01:24:22","date_gmt":"2023-04-17T01:24:22","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/sean-williams\/?p=287"},"modified":"2023-04-17T01:24:22","modified_gmt":"2023-04-17T01:24:22","slug":"write-up-scada-systems","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/sean-williams\/2023\/04\/17\/write-up-scada-systems\/","title":{"rendered":"Write-Up &#8211; SCADA Systems"},"content":{"rendered":"\n<p class=\"has-text-align-left has-medium-font-size\">Name: Sean Williams<br>Date: 3\/19\/23<br><br><em>I found the article very interesting and informative regarding how the inner workings of the SCADA system function. I also was able to better my understanding of the viability of the SCADA system in more situations than just the workplace. I also can now point out the vulnerabilities of the systems better than before.<\/em><\/p>\n\n\n\n<p class=\"has-text-align-left has-medium-font-size\"><br><strong>Scada Primary Role<\/strong><br>The Scada System is a mixture of both hardware and software that will let the users control the<br>processes of multiple areas of the industrial scene. SCADA stands for supervisory control and<br>data acquisition which is a centralized system that monitors and takes control of a whole site or<br>complex. It was mainly used for computing, distributing information through LAN, and<br>networking between systems and a master station. The master station is the display data that<br>was required which will also let the operator in use it, in case something has to be done<br>remotely. The system is now very recurring in the networking field and in most cases pretty<br>reliable, especially since its old parts are getting replaced with things like ethernet protocol.<\/p>\n\n\n\n<p class=\"has-text-align-left has-medium-font-size\"><br><strong>Critical Infrastructure Systems Vulnerabilities<br><\/strong>Even though all of these things were implemented there still are some issues with the system that could be too risky for some businesses to take. Because of how SCADA systems are able to monitor lots of industrial processes, it makes it very crucial that nothing happens to them because if it were to go down things like traffic lights, water systems, and the transportation of gas. The SCADA system is also vulnerable to cross-site scripting and SQL injection attacks, Seeing how the phones that the system is connected to our unexamined gives cyber-attackers a wide open door to go through to destroy the system. This could cause rapid and repetitive shutdowns which is not a good show for the system&#8217;s availability. Though they implement all kinds of stuff to the systems it doesn\u2019t stop it from having a lacking active network and if it were to fail to detect one threat could jeopardize the whole area.<\/p>\n\n\n\n<p class=\"has-text-align-left has-medium-font-size\"><br><strong>Conclusion<\/strong><br>In conclusion, This article that I read followed by the research I did on the subject has taught me how useful the SCADA system was. Also, I was able to learn about two new cyber-attacks, cross-site scripting, and SQL injection which are really common in our world. The System was sturdy and had amazing automation on all industrial processes. But in the era, we are now entering it is starting to lose the reliability it was known so greatly for. Maybe once they are implemented better to where the performance and integrity were increased it will do a lot better seeing how that&#8217;s the main issue with it.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Name: Sean WilliamsDate: 3\/19\/23 I found the article very interesting and informative regarding how the inner workings of the SCADA system function. I also was able to better my understanding of the viability of the SCADA system in more situations than just the workplace. I also can now point out the vulnerabilities of the systems&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/sean-williams\/2023\/04\/17\/write-up-scada-systems\/\">Read More<\/a><\/div>\n","protected":false},"author":26223,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/sean-williams\/wp-json\/wp\/v2\/posts\/287"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/sean-williams\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/sean-williams\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sean-williams\/wp-json\/wp\/v2\/users\/26223"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sean-williams\/wp-json\/wp\/v2\/comments?post=287"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/sean-williams\/wp-json\/wp\/v2\/posts\/287\/revisions"}],"predecessor-version":[{"id":288,"href":"https:\/\/sites.wp.odu.edu\/sean-williams\/wp-json\/wp\/v2\/posts\/287\/revisions\/288"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/sean-williams\/wp-json\/wp\/v2\/media?parent=287"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sean-williams\/wp-json\/wp\/v2\/categories?post=287"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sean-williams\/wp-json\/wp\/v2\/tags?post=287"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}