{"id":269,"date":"2021-12-06T04:42:38","date_gmt":"2021-12-06T04:42:38","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/terranceboakye\/?p=269"},"modified":"2021-12-06T04:42:39","modified_gmt":"2021-12-06T04:42:39","slug":"scada-systems","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/terranceboakye\/2021\/12\/06\/scada-systems\/","title":{"rendered":"SCADA Systems"},"content":{"rendered":"\n<p>Vulnerabilities In SCADA<br>Vulnerabilities associated with critical infrastructure systems are virus infections,<br>unauthorized access to software, and etc. These types of vulnerabilities can be very dangerous<br>because when hackers get ahold of the critical infrastructure system they can stop, for example,<br>water distribution systems, oil, and water pipelines. This is vital because if hackers get ahold of<br>this it will affect companies and people because these are things we use in our everyday lives.<br>SCADA systems can be damaged or shut down by someone who\u2019s managing the SCADA<br>system.<br>SCADA MITIGATION<br>There are several ways to lower the risk of the SCADA system getting infiltrated. One<br>method to mitigate SCADA systems is called multifactor authentication. What multifactor<br>authentication does is boost the security to access control systems. So it will ask something<br>that you know personally with additional steps. One more example to mitigate the SCADA<br>system is a firewall. A VPN is a virtual private network that can be used to create an encrypted<br>connection to the SCADA system.<br>Sources: SCADA system vulnerabilities to Cyber Attacks. Electric Energy Online. (n.d.).<br>Retrieved November 3, 2021, from<br>https:\/\/electricenergyonline.com\/energy\/magazine\/181\/article\/SCADA-System-Vulnerabilities-toCyber-Attack.htm. SCADA system vulnerabilities to Cyberattacks. Electric Energy Online. (n.d.).<br>Retrieved November 3, 2021, from<br>https:\/\/electricenergyonline.com\/energy\/magazine\/181\/article\/SCADA-System-Vulnerabilities-toCyber-Attack.htm.<br>Securing SCADA Networks &#8211; webobjects2.cdw.com. (n.d.). Retrieved November 3, 2021,<br>from<br>https:\/\/webobjects2.cdw.com\/is\/content\/CDW\/cdw\/on-domain-cdw\/industries\/energy\/whitepaper-securing-scada-networks.pdf<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Vulnerabilities In SCADAVulnerabilities associated with critical infrastructure systems are virus infections,unauthorized access to software, and etc. These types of vulnerabilities can be very dangerousbecause when hackers get ahold of the critical infrastructure system they can stop, for example,water distribution systems, oil, and water pipelines. This is vital because if hackers get ahold ofthis it will&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/terranceboakye\/2021\/12\/06\/scada-systems\/\">Read More<\/a><\/div>\n","protected":false},"author":21984,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/posts\/269"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/users\/21984"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/comments?post=269"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/posts\/269\/revisions"}],"predecessor-version":[{"id":273,"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/posts\/269\/revisions\/273"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/media?parent=269"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/categories?post=269"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/tags?post=269"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}