Do you know that The Stuxnet worm, discovered in 2010, succeeded in infecting the most secure nuclear facilities by using physical devices (USB flash drives)?
Do you know in 2016 , two nuclear powerplan in Belgium were locked down by terrorist?
Do you know that on 17-18 December 2016 Ukraine power blackout because cyberattack on powerplan system?
Terrorist attacking workstations and Supervisory Control and Data Acquisition (SCADA) systems. Cyber-attacks (by cyber terrorist or cyber-warframe that international conflicts) against Critical Infrastructures are gaining steam. Because stealth nature and potential to cause physical damage without deploying soldiers or utilizing traditional weapons, in many situations cyber-attack is the preferred method of attack.
Critical infrastructure is an asset or system which is essential for the maintenance of vital societal functions. The damage to a critical infrastructure, its destruction or disruption by natural disasters, terrorism, criminal activity or malicious behaviour, may have a significant negative impact for the security of country and the well-being of its citizens.
The following sectors and industries are widely considered to be critical infrastructure:
Sectors | Industries |
Energy | • Electricity
• Natural gas • Oil |
Information and Communication Technology (ICT) | • Telecommunications (including satellites)
• Broadcasting systems • Software, hardware and networks (including the Internet) |
Traffic and transportation | • Shipping
• Aviation • Rail transport • Road traffic • Logistics |
Healthcare | • Healthcare
• Medicines and vaccines • Laboratories |
Water supply | • Dams
• Storage • Treatment and distribution networks |
Finance and insurance | • Banks
• Stock exchanges • Insurance companies • Financial services |
Government and administration | • Government
• Parliament • Legal institutions • Emergency services |
Nutrition and agriculture | • Food trade
• Agriculture |
Media and cultural assets | • Radio
• Press • Symbolic buildings |
Source : National Infrastructure Protection Plan (NIPP), p. 109: U.S. Department of Homeland Security.
Cyber-attack or cyber-threat on Critical Infrastructure (CI) it have various type, but usually may include :
- Manipulate system or data – such as malware that exploit vulnerabilities in computer software and hardware components necessary for operation of CI’s;
- Shutdown crucial system – such as DDoS attacks;
- Limit access to crucial systems or information – such as through ransomware attack.
While interconnected and integrated computerized control system have significantly streamlined the way in which CIs operated and increased connectivity that mean also increase the attack surface and therefore expose Cis to a high risk of manipulation. There is table of threat in Industrial Control System :
No. | Threat | Explanation |
1 | Unauthorized use of remote maintenance access points | Maintenance access points are deliberately created external entrances to the ICs network and are often insufficiently secure |
2 | Online attacks via office or enterprise networks | Office IT is usually linked to the network in several ways.
In most case, network connection from offices to the ICS network also exist, so attacker can gain access via this route. |
3 | Attacks on standard components used in the Cis network | Standard IT components (commercial off-the-shelf) such as systems software, application servers or databases often contain flaws or vulnerabilities, which can be exploited by attackers. If these standard components are also used in the ICs network, the risk of a successful attack on the ICs network increases. |
4 | DDoS attacks | Distributed Denial of Services attacks can impair network connection and essential resources and cause systems to fail – in order to disrupt the operation of ICs, for instance. |
5 | Human error and sabotage | Intentional deeds – whether by internal or external perpretators – are a massive threat to all protection targets. Negligence and human error are also a great threat, especially in relation to the protection targets confidentiality and availability. |
6 | Introducing malware via removable media and external hardware | The use of removable media and mobile IT components of external staff always entails great risk of malware infection. |
7 | Reading and writing news in the ICs network | Most control components currently use clear text protocols, so communication is unprotected. This makes it relativelyeasy to read and introduce control commands. |
8 | Unauthorized access to resources | Internal perpetrators and subsequent attacks following initial external penetration have it especially easy if services and components in the process network do not utilize authentication methods or if the methods are insecure. |
9 | Attacks on network components | Attacekrs can manipulate network component in order to carry out man-in-the-middle attacks or to make sniffing easier, for example. |
10 | Technical Malfunctions or force majeure | Outage resulting from extreame weather or technical malfunctions can occur at any time – risk and potential damage can only be minimazes in such cases. |
Source : OSCE 2013
Bims.
Your style is really unique in comparison to other folks I’ve read stuff from.
I appreciate you for posting when you’ve got the opportunity, Guess I
will just bookmark this site.
No matter if some one searches for his required thing, so
he/she wishes to be available that in detail, so that thing
is maintained over here.
I am really pleased to read this web site posts which includes tons of
valuable facts, thanks for providing these kinds of statistics.
I for all time emailed this webpage post page to all my contacts, as
if like to read it next my friends will too.
Amazing things here. I am very satisfied to look your post.
Thank you a lot and I am having a look ahead to contact you.
Will you please drop me a mail?
Thankfulness to my father who stated to me regarding this webpage, this web site is truly amazing.
You’ve made some decent points there. I checked on the internet to
learn more about the issue and found most individuals
will go along with your views on this website.
It’s very simple to find out any topic on net as compared to textbooks, as I found this
post at this website.
Unquestionably believe that which you stated. Your favorite
justification seemed to be on the internet the simplest thing to be aware of.
I say to you, I certainly get annoyed while people
think about worries that they plainly don’t know about.
You managed to hit the nail upon the top and defined out the whole thing without having side effect , people could take a signal.
Will likely be back to get more. Thanks
Awesome! Its genuinely remarkable piece of writing, I have got much clear idea
regarding from this paragraph.
I just like the valuable information you provide in your articles.
I will bookmark your blog and take a look at again right here regularly.
I’m relatively sure I’ll learn many new stuff right right here!
Good luck for the next!
Hi just wanted to give you a quick heads up and let you know a
few of the images aren’t loading correctly.
I’m not sure why but I think its a linking issue. I’ve tried it in two different web browsers and both
show the same outcome.
Heya i am for the first time here. I came across this board and I find It truly useful &
it helped me out a lot. I hope to give something back and help others like you aided me.
I just couldn’t depart your website before suggesting that I extremely loved the standard info an individual supply in your visitors?
Is gonna be back steadily in order to inspect new posts
Howdy superb blog! Does running a blog like this take a massive amount work?
I’ve very little understanding of programming however I had been hoping to start
my own blog soon. Anyways, if you have any suggestions or techniques for new
blog owners please share. I understand this is off subject nevertheless I just had to ask.
Kudos!
Very shortly this web page will be famous among
all blog visitors, due to it’s fastidious articles
Hey there, I think your website might be having browser compatibility issues.
When I look at your blog in Safari, it looks fine but when opening in Internet Explorer, it has
some overlapping. I just wanted to give you a quick heads up!
Other then that, fantastic blog!
It’s going to be end of mine day, but before ending I
am reading this enormous article to increase my experience.
For newest news you have to go to see the web and on world-wide-web I found this website as a best site for latest updates.
With havin so much written content do you ever run into any problems of plagorism
or copyright violation? My site has a lot of completely
unique content I’ve either written myself or outsourced but
it looks like a lot of it is popping it up all over the web without my agreement.
Do you know any methods to help protect against
content from being stolen? I’d genuinely appreciate it.