Items Tagged with "Infrastructure"
September 26, 2011 Added by:Craig S Wright
There are a multitude of systems that simply need to be crashed, not controlled using an automated tool without human interaction. A human with control of a RAT does not need to write a variant for each system. They simply need to take control of the underlying operating system...
September 25, 2011 Added by:Scot Terban
In order to have the “mass casualties” scenario, Stuxnet variants would have to be as varied as the number of makers of PLC systems out there. Just as the actual payload file to make a fire sale scenario happen would geometrically increase to have to become its own form of bloatware...
September 24, 2011 Added by:Joel Harding
Mitsubishi Heavy Industries in Japan is under attack. Why is this not a cyberwar? Besides the obvious legal definitions where this doesn’t even remotely resemble a war - no declaration of war nor is there an ‘act of war’ as in the US Code - and there is certainly no death and destruction...
September 23, 2011 Added by:Craig S Wright
Nearly all SCADA systems are online. The addition of a simple NAT device is NOT a control. Most of these systems are horribly patched and some run DOS, Win 95, Win 98 and even old Unixs. Some are on outdated versions of VMS. One I know of is on a Cray and another is on a PDP-11...
September 23, 2011 Added by:Scot Terban
Sure, there are many systems out there running PLC’s and they are likely vulnerable to any number of attacks. However, can you please look back and see how long it actually took persons unknown to create the Stuxnet attack, and breathe a little before you go crying to the likes of the Monitor?
September 23, 2011 Added by:Headlines
"After Stuxnet was identified as a weapon, we recommended to every asset owner in America – owners of power plants, chemical plants, refineries and others – to make it a top priority to protect their systems... That wakeup call lasted about a week. Thereafter, everybody fell back into coma..."
September 19, 2011 Added by:Headlines
"Finding zero-day (previously unknown holes) in SCADA software is like nuking fish in a barrel. People purchasing these systems need to push back on suppliers and ask them what they are doing to secure the system before selling it to customers," said Chris Wysopal, CTO for Veracode...
September 14, 2011 Added by:Headlines
"The potential benefits of Smart Grids are enormous, they can only be fully reached if we can all agree on global solutions. It is promising to see that NIST and SG-CG will be supporting common positions and areas of collaboration to ensure a consistent set of international standards..."
September 08, 2011 Added by:Chris Blask
The three scenarios exercise the legal issues of government access to information of increasing depth. The first two speak to capabilities that should be further developed -honeynets and continuous monitoring - while the third scenario in part touches on workforce development...
August 26, 2011 Added by:Joel Harding
Without electricity most of us are going to be hosed, we won't have access to social media to communicate with family and friends. We won't be able to check the latest news and information from the government from websites and once everybody has moved to the cell phone networks, they'll crash...
August 25, 2011 Added by:Headlines
Friday, August 26, 2011 from 12:00 p.m. – 1:00 p.m. EDT: The purpose of the call is to update partners on DHS IP Hurricane Irene planning and preparation activities, procedures, and capabilities should the hurricane make landfall and significantly impact critical infrastructure operations...
August 22, 2011 Added by:Headlines
"The Defense Advanced Research Projects Agency (DARPA) is requesting information on innovative technologies and approaches to secure the Nation’s infrastructure and to ensure the survival of the Department of Defense’s cyber capabilities in case of attack..."
August 15, 2011 Added by:Headlines
Clinton’s election to the ITSCC is critical at this point in time, as some of the legislative efforts underway may serve to fundamentally alter the public-private partnership envisioned in the National Infrastructure Protection Plan and the Obama Administration’s Cyberspace Policy Review...
August 04, 2011 Added by:Scot Terban
Today we have a hacker community out there able to get their hands on code easily and even perhaps the PLC systems themselves to create even more exploits. Add to this that many SCADA systems have been connected to the Internet (as they should NEVER BE) ripe for attack and we have a big problem...
July 21, 2011 Added by:Headlines
“In an era when our nation and its allies are increasingly dependent on the integrity of information and systems supported, transmitted, or stored in cyberspace, it is essential that that space is as resilient and secure as possible," said NSA Deputy Director John C. Inglis...