Do you know that The Stuxnet worm, discovered in 2010, succeeded in infecting the most secure nuclear facilities by using physical devices (USB flash drives)?
Do you know in 2016 , two nuclear powerplan in Belgium were locked down by terrorist?
Do you know that on 17-18 December 2016 Ukraine power blackout because cyberattack on powerplan system?
Terrorist attacking workstations and Supervisory Control and Data Acquisition (SCADA) systems. Cyber-attacks (by cyber terrorist or cyber-warframe that international conflicts) against Critical Infrastructures are gaining steam. Because stealth nature and potential to cause physical damage without deploying soldiers or utilizing traditional weapons, in many situations cyber-attack is the preferred method of attack.
Critical infrastructure is an asset or system which is essential for the maintenance of vital societal functions. The damage to a critical infrastructure, its destruction or disruption by natural disasters, terrorism, criminal activity or malicious behaviour, may have a significant negative impact for the security of country and the well-being of its citizens.
The following sectors and industries are widely considered to be critical infrastructure:
Sectors | Industries |
Energy | • Electricity
• Natural gas • Oil |
Information and Communication Technology (ICT) | • Telecommunications (including satellites)
• Broadcasting systems • Software, hardware and networks (including the Internet) |
Traffic and transportation | • Shipping
• Aviation • Rail transport • Road traffic • Logistics |
Healthcare | • Healthcare
• Medicines and vaccines • Laboratories |
Water supply | • Dams
• Storage • Treatment and distribution networks |
Finance and insurance | • Banks
• Stock exchanges • Insurance companies • Financial services |
Government and administration | • Government
• Parliament • Legal institutions • Emergency services |
Nutrition and agriculture | • Food trade
• Agriculture |
Media and cultural assets | • Radio
• Press • Symbolic buildings |
Source : National Infrastructure Protection Plan (NIPP), p. 109: U.S. Department of Homeland Security.
Cyber-attack or cyber-threat on Critical Infrastructure (CI) it have various type, but usually may include :
- Manipulate system or data – such as malware that exploit vulnerabilities in computer software and hardware components necessary for operation of CI’s;
- Shutdown crucial system – such as DDoS attacks;
- Limit access to crucial systems or information – such as through ransomware attack.
While interconnected and integrated computerized control system have significantly streamlined the way in which CIs operated and increased connectivity that mean also increase the attack surface and therefore expose Cis to a high risk of manipulation. There is table of threat in Industrial Control System :
No. | Threat | Explanation |
1 | Unauthorized use of remote maintenance access points | Maintenance access points are deliberately created external entrances to the ICs network and are often insufficiently secure |
2 | Online attacks via office or enterprise networks | Office IT is usually linked to the network in several ways.
In most case, network connection from offices to the ICS network also exist, so attacker can gain access via this route. |
3 | Attacks on standard components used in the Cis network | Standard IT components (commercial off-the-shelf) such as systems software, application servers or databases often contain flaws or vulnerabilities, which can be exploited by attackers. If these standard components are also used in the ICs network, the risk of a successful attack on the ICs network increases. |
4 | DDoS attacks | Distributed Denial of Services attacks can impair network connection and essential resources and cause systems to fail – in order to disrupt the operation of ICs, for instance. |
5 | Human error and sabotage | Intentional deeds – whether by internal or external perpretators – are a massive threat to all protection targets. Negligence and human error are also a great threat, especially in relation to the protection targets confidentiality and availability. |
6 | Introducing malware via removable media and external hardware | The use of removable media and mobile IT components of external staff always entails great risk of malware infection. |
7 | Reading and writing news in the ICs network | Most control components currently use clear text protocols, so communication is unprotected. This makes it relativelyeasy to read and introduce control commands. |
8 | Unauthorized access to resources | Internal perpetrators and subsequent attacks following initial external penetration have it especially easy if services and components in the process network do not utilize authentication methods or if the methods are insecure. |
9 | Attacks on network components | Attacekrs can manipulate network component in order to carry out man-in-the-middle attacks or to make sniffing easier, for example. |
10 | Technical Malfunctions or force majeure | Outage resulting from extreame weather or technical malfunctions can occur at any time – risk and potential damage can only be minimazes in such cases. |
Source : OSCE 2013
Bims.
Hi, i think that i saw you visited my site thus i came to “return the
favor”.I’m attempting to find things to improve my site!I suppose its ok to
use some of your ideas!!
You can certainly see your skills in the work you write.
The sector hopes for more passionate writers like you who are not afraid
to mention how they believe. All the time go after your heart.
I love your blog.. very nice colors & theme. Did you create this website yourself or did
you hire someone to do it for you? Plz answer back as I’m looking to
construct my own blog and would like to know where u
got this from. appreciate it
Wow, this paragraph is pleasant, my younger sister is analyzing these things, thus I am going to tell
her.
Hello there, just became alert to your blog through Google, and found that it is truly informative.
I’m going to watch out for brussels. I’ll appreciate if you continue this in future.
A lot of people will be benefited from your writing. Cheers!
hacklink google online idigic.
Fucking Useless Piost
Porn Sex & Anel Sex Collection
Asking questions are really pleasant thing if you are
not understanding something completely, except this piece of writing provides
fastidious understanding yet.
Great information. Lucky me I found your website by
chance (stumbleupon). I have saved it for later!
I enjoy what you guys are usually up too. Such clever
work and exposure! Keep up the superb works guys I’ve included you guys
to my own blogroll.
Its such as you read my mind! You appear to understand a lot approximately this, such as you wrote the e
book in it or something. I feel that you simply could do with some % to drive the
message home a little bit, but other than that, that is fantastic blog.
A great read. I will certainly be back.
Hello my friend! I want to say that this article
is awesome, nice written and come with almost all vital infos.
I would like to peer more posts like this .
Magnificent beat ! I wish to apprentice while you amend your site, how can i subscribe for a blog site?
The account helped me a acceptable deal. I had been tiny bit acquainted of this your broadcast
offered bright clear idea
Your style is very unique in comparison to other people I have read stuff from.
Many thanks for posting when you have the opportunity, Guess I will just book mark this page.
Hello to all, how is all, I think every one is getting more from this web
page, and your views are nice designed for new people.
Does your blog have a contact page? I’m having trouble
locating it but, I’d like to shoot you an email.
I’ve got some creative ideas for your blog you might be interested in hearing.
Either way, great site and I look forward to seeing it grow over time.
Hi my loved one! I wish to say that this article is awesome,
great written and come with approximately all vital infos.
I’d like to peer extra posts like this .
I visited many sites however the audio feature
for audio songs current at this web page is in fact fabulous.
Howdy, I do think your blog may be having web browser
compatibility issues. When I take a look at your blog in Safari, it looks fine however,
when opening in IE, it’s got some overlapping issues. I merely wanted to provide you with a quick heads up!
Other than that, great blog!
What’s up everyone, it’s my first pay a visit at this web site, and paragraph is in fact fruitful designed for me,
keep up posting these articles.