Do you know that The Stuxnet worm, discovered in 2010, succeeded in infecting the most secure nuclear facilities by using physical devices (USB flash drives)?
Do you know in 2016 , two nuclear powerplan in Belgium were locked down by terrorist?
Do you know that on 17-18 December 2016 Ukraine power blackout because cyberattack on powerplan system?
Terrorist attacking workstations and Supervisory Control and Data Acquisition (SCADA) systems. Cyber-attacks (by cyber terrorist or cyber-warframe that international conflicts) against Critical Infrastructures are gaining steam. Because stealth nature and potential to cause physical damage without deploying soldiers or utilizing traditional weapons, in many situations cyber-attack is the preferred method of attack.
Critical infrastructure is an asset or system which is essential for the maintenance of vital societal functions. The damage to a critical infrastructure, its destruction or disruption by natural disasters, terrorism, criminal activity or malicious behaviour, may have a significant negative impact for the security of country and the well-being of its citizens.
The following sectors and industries are widely considered to be critical infrastructure:
Sectors | Industries |
Energy | • Electricity
• Natural gas • Oil |
Information and Communication Technology (ICT) | • Telecommunications (including satellites)
• Broadcasting systems • Software, hardware and networks (including the Internet) |
Traffic and transportation | • Shipping
• Aviation • Rail transport • Road traffic • Logistics |
Healthcare | • Healthcare
• Medicines and vaccines • Laboratories |
Water supply | • Dams
• Storage • Treatment and distribution networks |
Finance and insurance | • Banks
• Stock exchanges • Insurance companies • Financial services |
Government and administration | • Government
• Parliament • Legal institutions • Emergency services |
Nutrition and agriculture | • Food trade
• Agriculture |
Media and cultural assets | • Radio
• Press • Symbolic buildings |
Source : National Infrastructure Protection Plan (NIPP), p. 109: U.S. Department of Homeland Security.
Cyber-attack or cyber-threat on Critical Infrastructure (CI) it have various type, but usually may include :
- Manipulate system or data – such as malware that exploit vulnerabilities in computer software and hardware components necessary for operation of CI’s;
- Shutdown crucial system – such as DDoS attacks;
- Limit access to crucial systems or information – such as through ransomware attack.
While interconnected and integrated computerized control system have significantly streamlined the way in which CIs operated and increased connectivity that mean also increase the attack surface and therefore expose Cis to a high risk of manipulation. There is table of threat in Industrial Control System :
No. | Threat | Explanation |
1 | Unauthorized use of remote maintenance access points | Maintenance access points are deliberately created external entrances to the ICs network and are often insufficiently secure |
2 | Online attacks via office or enterprise networks | Office IT is usually linked to the network in several ways.
In most case, network connection from offices to the ICS network also exist, so attacker can gain access via this route. |
3 | Attacks on standard components used in the Cis network | Standard IT components (commercial off-the-shelf) such as systems software, application servers or databases often contain flaws or vulnerabilities, which can be exploited by attackers. If these standard components are also used in the ICs network, the risk of a successful attack on the ICs network increases. |
4 | DDoS attacks | Distributed Denial of Services attacks can impair network connection and essential resources and cause systems to fail – in order to disrupt the operation of ICs, for instance. |
5 | Human error and sabotage | Intentional deeds – whether by internal or external perpretators – are a massive threat to all protection targets. Negligence and human error are also a great threat, especially in relation to the protection targets confidentiality and availability. |
6 | Introducing malware via removable media and external hardware | The use of removable media and mobile IT components of external staff always entails great risk of malware infection. |
7 | Reading and writing news in the ICs network | Most control components currently use clear text protocols, so communication is unprotected. This makes it relativelyeasy to read and introduce control commands. |
8 | Unauthorized access to resources | Internal perpetrators and subsequent attacks following initial external penetration have it especially easy if services and components in the process network do not utilize authentication methods or if the methods are insecure. |
9 | Attacks on network components | Attacekrs can manipulate network component in order to carry out man-in-the-middle attacks or to make sniffing easier, for example. |
10 | Technical Malfunctions or force majeure | Outage resulting from extreame weather or technical malfunctions can occur at any time – risk and potential damage can only be minimazes in such cases. |
Source : OSCE 2013
Bims.
Thank you for some other informative web site. Where else may just I am getting that
kind of info written in such an ideal means? I’ve a project that I am simply now
operating on, and I have been on the glance out for such info.
Thanks for sharing your thoughts about 칠곡출장마사지.
Regards
Appreciating the time and energy you put into your site and detailed information you offer.
It’s nice to come across a blog every once in a while that isn’t the same old
rehashed material. Wonderful read! I’ve saved your site and I’m including your RSS
feeds to my Google account.
Asking questions are genuinely nice thing if you are not understanding anything
fully, but this post offers fastidious understanding even.
I’m not that much of a online reader to be honest but your blogs really nice,
keep it up! I’ll go ahead and bookmark your website to come back
down the road. Many thanks
This site was… how do you say it? Relevant!! Finally I have found something that helped me.
Thank you!
Hey! Someone in my Myspace group shared this website with
us so I came to take a look. I’m definitely loving the information.
I’m book-marking and will be tweeting this to my followers!
Exceptional blog and amazing style and design.
Fine way of telling, and fastidious post to get information concerning my presentation topic, which i am going to
convey in academy.
Wonderful blog you have here but I was wondering if you knew of any user discussion forums that cover
the same topics discussed in this article? I’d really like to be a part of group where
I can get feedback from other experienced people that share the same interest.
If you have any suggestions, please let me know. Thank you!
Hello! I understand this is kind of off-topic however I had to ask.
Does running a well-established blog such as yours require a large amount of work?
I’m brand new to blogging but I do write in my diary on a daily basis.
I’d like to start a blog so I will be able to share my experience and views online.
Please let me know if you have any kind of suggestions or tips for new aspiring blog owners.
Appreciate it!
I know this site offers quality dependent articles or reviews and extra data,
is there any other web page which gives these kinds of things in quality?
great points altogether, you simply won a logo new reader.
What might you recommend in regards to your
submit that you made some days in the past? Any positive?
I know this if off topic but I’m looking into starting
my own weblog and was wondering what all is needed to get set up?
I’m assuming having a blog like yours would cost a pretty penny?
I’m not very web savvy so I’m not 100% positive. Any tips or advice would be greatly
appreciated. Thank you
Hello just wanted to give you a brief heads up and let you know
a few of the pictures aren’t loading correctly. I’m not sure why but I think its a linking issue.
I’ve tried it in two different internet browsers and both show the same outcome.
Hello, I enjoy reading all of your article.
I like to write a little comment to support you.
hi!,I like your writing very so much! share we keep up a
correspondence extra approximately your post on AOL?
I need an expert in this area to resolve my problem.
Maybe that is you! Looking ahead to peer you.
Way cool! Some very valid points! I appreciate you penning this write-up and also the rest of the website
is really good.
Hello! I know this is kind of off topic but I was
wondering if you knew where I could get a captcha plugin for my comment form?
I’m using the same blog platform as yours and I’m having difficulty finding one?
Thanks a lot!
Hello every one, here every one is sharing such experience, so it’s good to read this web site,
and I used to pay a quick visit this webpage everyday.
You have made some decent points there. I checked on the net for more info
about the issue and found most people will go along with your
views on this website.