Do you know that The Stuxnet worm, discovered in 2010, succeeded in infecting the most secure nuclear facilities by using physical devices (USB flash drives)?
Do you know in 2016 , two nuclear powerplan in Belgium were locked down by terrorist?
Do you know that on 17-18 December 2016 Ukraine power blackout because cyberattack on powerplan system?
Terrorist attacking workstations and Supervisory Control and Data Acquisition (SCADA) systems. Cyber-attacks (by cyber terrorist or cyber-warframe that international conflicts) against Critical Infrastructures are gaining steam. Because stealth nature and potential to cause physical damage without deploying soldiers or utilizing traditional weapons, in many situations cyber-attack is the preferred method of attack.
Critical infrastructure is an asset or system which is essential for the maintenance of vital societal functions. The damage to a critical infrastructure, its destruction or disruption by natural disasters, terrorism, criminal activity or malicious behaviour, may have a significant negative impact for the security of country and the well-being of its citizens.
The following sectors and industries are widely considered to be critical infrastructure:
Sectors | Industries |
Energy | • Electricity
• Natural gas • Oil |
Information and Communication Technology (ICT) | • Telecommunications (including satellites)
• Broadcasting systems • Software, hardware and networks (including the Internet) |
Traffic and transportation | • Shipping
• Aviation • Rail transport • Road traffic • Logistics |
Healthcare | • Healthcare
• Medicines and vaccines • Laboratories |
Water supply | • Dams
• Storage • Treatment and distribution networks |
Finance and insurance | • Banks
• Stock exchanges • Insurance companies • Financial services |
Government and administration | • Government
• Parliament • Legal institutions • Emergency services |
Nutrition and agriculture | • Food trade
• Agriculture |
Media and cultural assets | • Radio
• Press • Symbolic buildings |
Source : National Infrastructure Protection Plan (NIPP), p. 109: U.S. Department of Homeland Security.
Cyber-attack or cyber-threat on Critical Infrastructure (CI) it have various type, but usually may include :
- Manipulate system or data – such as malware that exploit vulnerabilities in computer software and hardware components necessary for operation of CI’s;
- Shutdown crucial system – such as DDoS attacks;
- Limit access to crucial systems or information – such as through ransomware attack.
While interconnected and integrated computerized control system have significantly streamlined the way in which CIs operated and increased connectivity that mean also increase the attack surface and therefore expose Cis to a high risk of manipulation. There is table of threat in Industrial Control System :
No. | Threat | Explanation |
1 | Unauthorized use of remote maintenance access points | Maintenance access points are deliberately created external entrances to the ICs network and are often insufficiently secure |
2 | Online attacks via office or enterprise networks | Office IT is usually linked to the network in several ways.
In most case, network connection from offices to the ICS network also exist, so attacker can gain access via this route. |
3 | Attacks on standard components used in the Cis network | Standard IT components (commercial off-the-shelf) such as systems software, application servers or databases often contain flaws or vulnerabilities, which can be exploited by attackers. If these standard components are also used in the ICs network, the risk of a successful attack on the ICs network increases. |
4 | DDoS attacks | Distributed Denial of Services attacks can impair network connection and essential resources and cause systems to fail – in order to disrupt the operation of ICs, for instance. |
5 | Human error and sabotage | Intentional deeds – whether by internal or external perpretators – are a massive threat to all protection targets. Negligence and human error are also a great threat, especially in relation to the protection targets confidentiality and availability. |
6 | Introducing malware via removable media and external hardware | The use of removable media and mobile IT components of external staff always entails great risk of malware infection. |
7 | Reading and writing news in the ICs network | Most control components currently use clear text protocols, so communication is unprotected. This makes it relativelyeasy to read and introduce control commands. |
8 | Unauthorized access to resources | Internal perpetrators and subsequent attacks following initial external penetration have it especially easy if services and components in the process network do not utilize authentication methods or if the methods are insecure. |
9 | Attacks on network components | Attacekrs can manipulate network component in order to carry out man-in-the-middle attacks or to make sniffing easier, for example. |
10 | Technical Malfunctions or force majeure | Outage resulting from extreame weather or technical malfunctions can occur at any time – risk and potential damage can only be minimazes in such cases. |
Source : OSCE 2013
Bims.
If you desire to grow your familiarity just keep visiting this web site and
be updated with the latest gossip posted here.
I’m really enjoying the design and layout of your website.
It’s a very easy on the eyes which makes it much more pleasant for me to
come here and visit more often. Did you hire out a designer to create your theme?
Great work!
I’ll immediately snatch your rss feed as I can’t in finding your e-mail subscription hyperlink or newsletter service.
Do you have any? Please let me recognise in order that I
may just subscribe. Thanks.
I relish, lead to I discovered exactly what I was having
a look for. You’ve ended my four day lengthy hunt!
God Bless you man. Have a great day. Bye
What a information of un-ambiguity and preserveness of precious knowledge on the topic of unpredicted emotions.
Quality posts is the key to be a focus for the viewers to pay a quick visit the
web site, that’s what this site is providing.
excellent issues altogether, you simply gained a new reader.
What could you suggest about your put up that you made a few days in the
past? Any certain?
Wow, this paragraph is pleasant, my younger sister is analyzing these things, thus I am going
to convey her.
It is appropriate time to make some plans for the future and it is time to be
happy. I’ve read this post and if I could I desire to suggest you few interesting things or advice.
Maybe you can write next articles referring to this article.
I wish to read even more things about it!
Pretty! This was a really wonderful article. Many thanks for supplying these details.
These are really enormous ideas in regarding
blogging. You have touched some fastidious points here.
Any way keep up wrinting.
Amazing! Its genuinely awesome paragraph, I
have got much clear idea concerning from this paragraph.
I do not know whether it’s just me or if perhaps everybody else
experiencing issues with your site. It looks like some of the
written text on your posts are running off the screen. Can someone else please provide feedback and let me know if this is happening
to them as well? This may be a issue with my web browser because I’ve
had this happen previously. Thank you
I’m really inspired along with your writing skills and also with the structure on your weblog.
Is this a paid theme or did you modify it yourself? Anyway keep up the excellent high quality writing, it is rare to see
a great weblog like this one nowadays..
Woah! I’m really digging the template/theme of this website.
It’s simple, yet effective. A lot of times it’s hard to get that “perfect balance” between usability and visual appearance.
I must say that you’ve done a superb job with this.
Also, the blog loads extremely fast for me on Opera.
Exceptional Blog!
Heya are using WordPress for your blog platform? I’m new to the blog world but I’m trying to get started and create my own. Do
you need any coding expertise to make your own blog? Any help would be really appreciated!
It’s awesome designed for me to have a website, which is useful designed for my knowledge.
thanks admin
Undeniably imagine that that you said. Your favorite justification appeared
to be on the internet the easiest factor to take note of.
I say to you, I definitely get annoyed while people think about issues that they just do not recognise about.
You controlled to hit the nail upon the highest as neatly as outlined out the whole thing without having side effect , other
people can take a signal. Will likely be again to get more.
Thanks
What’s up to every one, it’s genuinely a fastidious for me to go to see this site, it consists of
valuable Information.
Really nice design and wonderful subject matter, very little
else we need :D.