{"id":292,"date":"2026-04-13T16:43:11","date_gmt":"2026-04-13T16:43:11","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/thomashileman\/?p=292"},"modified":"2026-04-13T16:43:11","modified_gmt":"2026-04-13T16:43:11","slug":"scada-systems","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/thomashileman\/2026\/04\/13\/scada-systems\/","title":{"rendered":"SCADA Systems"},"content":{"rendered":"<br \/>Mission critical infrastructure is just as vulnerable to cyber-attacks as normal<br \/>infrastructure. This is why Supervisory Control and Data Acquisition (SCADA) systems are also<br \/>vulnerable to attacks. The article states \u201cIn numerous cases, there remains less or no security on<br \/>actual packet control protocol\u201d (SCADA Systems p. 6). This represents a very big problem as<br \/>most of the systems are barebones for efficiency\u2019s sake which is not bad for effective work but is<br \/>terrible for security. What needs to be improved upon is the security systems implemented to<br \/>defend the infrastructures data. A current lack of security systems could result in a disaster or a<br \/>fatal strike to a state\u2019s infrastructure.<br \/>Another problem with SCADA systems is not only a cyber-attack but an in-person<br \/>security threat. Someone who gains access to the controls who should not have access. Say a<br \/>repair man is not there to fix the systems but also gather data and plant a virus into the system.<br \/>This also asks for the need for physical security as well as it doesn\u2019t matter if you have the best<br \/>virtual security in the world if someone can walk into the building and gain access it doesn\u2019t<br \/>matter.<br \/>With all that being said SCADA is not a useless system by any means. SCADA systems<br \/>are great at being redundant for repairs. The networks are segmented off so you can quarantine<br \/>an area if need be. The systems are essentially composed of building blocks that can be hot<br \/>swapped in and out of one another depending on the jobs needed to be done at the time. Over all<br \/>the SCADA system is a great foundation for infrastructure systems but can be improved upon in<br \/>future iterations.<br \/><br \/>References<br \/>SCADA Systems http:\/\/www.scadasystems.net.","protected":false},"excerpt":{"rendered":"<p>Mission critical infrastructure is just as vulnerable to cyber-attacks as normalinfrastructure. This is why Supervisory Control and Data Acquisition (SCADA) systems are alsovulnerable to attacks. The article states \u201cIn numerous cases, there remains less or no security onactual packet control protocol\u201d (SCADA Systems p. 6). This represents a very big problem asmost of the systems&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/thomashileman\/2026\/04\/13\/scada-systems\/\">Read More<\/a><\/div>\n","protected":false},"author":32146,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/thomashileman\/wp-json\/wp\/v2\/posts\/292"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/thomashileman\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/thomashileman\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/thomashileman\/wp-json\/wp\/v2\/users\/32146"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/thomashileman\/wp-json\/wp\/v2\/comments?post=292"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/thomashileman\/wp-json\/wp\/v2\/posts\/292\/revisions"}],"predecessor-version":[{"id":293,"href":"https:\/\/sites.wp.odu.edu\/thomashileman\/wp-json\/wp\/v2\/posts\/292\/revisions\/293"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/thomashileman\/wp-json\/wp\/v2\/media?parent=292"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/thomashileman\/wp-json\/wp\/v2\/categories?post=292"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/thomashileman\/wp-json\/wp\/v2\/tags?post=292"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}