Do you know that The Stuxnet worm, discovered in 2010, succeeded in infecting the most secure nuclear facilities by using physical devices (USB flash drives)?
Do you know in 2016 , two nuclear powerplan in Belgium were locked down by terrorist?
Do you know that on 17-18 December 2016 Ukraine power blackout because cyberattack on powerplan system?
Terrorist attacking workstations and Supervisory Control and Data Acquisition (SCADA) systems. Cyber-attacks (by cyber terrorist or cyber-warframe that international conflicts) against Critical Infrastructures are gaining steam. Because stealth nature and potential to cause physical damage without deploying soldiers or utilizing traditional weapons, in many situations cyber-attack is the preferred method of attack.
Critical infrastructure is an asset or system which is essential for the maintenance of vital societal functions. The damage to a critical infrastructure, its destruction or disruption by natural disasters, terrorism, criminal activity or malicious behaviour, may have a significant negative impact for the security of country and the well-being of its citizens.
The following sectors and industries are widely considered to be critical infrastructure:
Sectors | Industries |
Energy | • Electricity
• Natural gas • Oil |
Information and Communication Technology (ICT) | • Telecommunications (including satellites)
• Broadcasting systems • Software, hardware and networks (including the Internet) |
Traffic and transportation | • Shipping
• Aviation • Rail transport • Road traffic • Logistics |
Healthcare | • Healthcare
• Medicines and vaccines • Laboratories |
Water supply | • Dams
• Storage • Treatment and distribution networks |
Finance and insurance | • Banks
• Stock exchanges • Insurance companies • Financial services |
Government and administration | • Government
• Parliament • Legal institutions • Emergency services |
Nutrition and agriculture | • Food trade
• Agriculture |
Media and cultural assets | • Radio
• Press • Symbolic buildings |
Source : National Infrastructure Protection Plan (NIPP), p. 109: U.S. Department of Homeland Security.
Cyber-attack or cyber-threat on Critical Infrastructure (CI) it have various type, but usually may include :
- Manipulate system or data – such as malware that exploit vulnerabilities in computer software and hardware components necessary for operation of CI’s;
- Shutdown crucial system – such as DDoS attacks;
- Limit access to crucial systems or information – such as through ransomware attack.
While interconnected and integrated computerized control system have significantly streamlined the way in which CIs operated and increased connectivity that mean also increase the attack surface and therefore expose Cis to a high risk of manipulation. There is table of threat in Industrial Control System :
No. | Threat | Explanation |
1 | Unauthorized use of remote maintenance access points | Maintenance access points are deliberately created external entrances to the ICs network and are often insufficiently secure |
2 | Online attacks via office or enterprise networks | Office IT is usually linked to the network in several ways.
In most case, network connection from offices to the ICS network also exist, so attacker can gain access via this route. |
3 | Attacks on standard components used in the Cis network | Standard IT components (commercial off-the-shelf) such as systems software, application servers or databases often contain flaws or vulnerabilities, which can be exploited by attackers. If these standard components are also used in the ICs network, the risk of a successful attack on the ICs network increases. |
4 | DDoS attacks | Distributed Denial of Services attacks can impair network connection and essential resources and cause systems to fail – in order to disrupt the operation of ICs, for instance. |
5 | Human error and sabotage | Intentional deeds – whether by internal or external perpretators – are a massive threat to all protection targets. Negligence and human error are also a great threat, especially in relation to the protection targets confidentiality and availability. |
6 | Introducing malware via removable media and external hardware | The use of removable media and mobile IT components of external staff always entails great risk of malware infection. |
7 | Reading and writing news in the ICs network | Most control components currently use clear text protocols, so communication is unprotected. This makes it relativelyeasy to read and introduce control commands. |
8 | Unauthorized access to resources | Internal perpetrators and subsequent attacks following initial external penetration have it especially easy if services and components in the process network do not utilize authentication methods or if the methods are insecure. |
9 | Attacks on network components | Attacekrs can manipulate network component in order to carry out man-in-the-middle attacks or to make sniffing easier, for example. |
10 | Technical Malfunctions or force majeure | Outage resulting from extreame weather or technical malfunctions can occur at any time – risk and potential damage can only be minimazes in such cases. |
Source : OSCE 2013
Bims.
These are truly impressive ideas in on the topic of blogging.
You have touched some nice factors here. Any way keep up wrinting.
I for all time emailed this website post page to all my contacts,
because if like to read it afterward my links
will too.
Undeniably believe that which you said. Your favorite justification appeared to be on the web the
simplest thing to be aware of. I say to you, I certainly get irked
while people think about worries that they plainly do not know about.
You managed to hit the nail upon the top
as well as defined out the whole thing without having side
effect , people could take a signal. Will likely be back to get more.
Thanks
I have learn a few good stuff here. Definitely value bookmarking for revisiting.
I surprise how much effort you set to create one of these excellent informative website.
What i do not realize is in fact how you are now not actually a lot more smartly-appreciated than you may be right now.
You are very intelligent. You already know therefore significantly on the subject of this topic,
produced me in my view imagine it from a lot of various angles.
Its like men and women aren’t fascinated unless it is one thing to accomplish with Lady gaga!
Your personal stuffs outstanding. At all times care for it up!
site indexletme çalılşması. Bionluk backlinks kullanıcısı.
As taxas podem variar como seu risco de crédito.
Howdy, i read your blog from time to time and i own a similar one and i was just wondering if you get a lot of spam feedback?
If so how do you reduce it, any plugin or anything you can advise?
I get so much lately it’s driving me mad so any support is very much appreciated.
Hi there! I know this is somewhat off topic but I was wondering which blog platform
are you using for this website? I’m getting sick and tired of WordPress because I’ve had issues with hackers and I’m looking at alternatives for another
platform. I would be fantastic if you could point me in the direction of a
good platform.
wonderful submit, very informative. I ponder why the opposite
specialists of this sector do not notice this. You should proceed your
writing. I’m confident, you have a huge readers’ base already!
Good post. I learn something totally new and challenging
on sites I stumbleupon on a daily basis. It will always be helpful to read content from other writers and use
a little something from other sites.
This is very interesting, You are a very skilled blogger.
I’ve joined your rss feed and look forward to seeking more of
your excellent post. Also, I have shared your site in my social
networks!
It’s wonderful that you are getting ideas from this piece of writing as well as from our
dialogue made at this time.
Hello, every time i used to check webpage posts here
early in the morning, as i enjoy to learn more and more.
I every time spent my half an hour to read this weblog’s posts all the time along with
a mug of coffee.
Inspiring story there. What occurred after? Take care!
Trabalhe bastante para conseguir grana simples.
Hi! Do you know if they make any plugins to protect against hackers?
I’m kinda paranoid about losing everything I’ve worked hard on. Any recommendations?
Howdy would you mind letting me know which hosting company you’re
working with? I’ve loaded your blog in 3 different browsers and I must say this
blog loads a lot quicker then most. Can you recommend a
good web hosting provider at a honest price? Thanks a lot, I appreciate it!
You need to take part in a contest for one of the most useful blogs on the web.
I am going to recommend this blog!