CYBERSECURITY VULNERABILITIES AND RISK MITIGATION IN TIER-1 SCADA SYSTEMS: A COMPREHENSIVE ASSESSMENT OF THREATS AND SOLUTIONS
DOI:
https://doi.org/10.64751/ijdim.2025.v4.n1.pp28-39Keywords:
SCADA SYSTEMS, CYBERSECURITY VULNERABILITIES ,RISK MITIGATION, PATCH MANAGEMENT, CRITICAL INFRASTRUCTURE SECURITYAbstract
This study seeks to analyse the security threats of Tier-1 SCADA systems in enterprise networks. Nevertheless, since SCADA systems are used to manage important facilities and services, they require integration with IT networks, which in turn exposes them to a great number of risks. The study further reveals that there are several weaknesses with the SCADA components including input validation weakness, buffer overflow, hard-coded credentials, and archaic encryption. It also ventures into poor patch management practices as well as their effects on operational security. From this analysis of these risks, the research presents the following possible remedies like enhancing the depth of encryption, providing the dynamic nature in firewall rules, and granting autonomy to patching. The work employs the standard stages of cyber risk assessment including identification, analysis, risk prioritization, risk control, and ongoing risk monitoring while providing a step-by-step methodology to improve the protection of SCADA systems. The gains achieved depict the fact that, in the case of enhancing security to specific assets, it is possible to enhance the system defences against current and future threats. This work enriches the contemporary knowledge base on SCADA system security threats and offers original, context-aware recommendations for enhancing protection.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.






