Do you know that The Stuxnet worm, discovered in 2010, succeeded in infecting the most secure nuclear facilities by using physical devices (USB flash drives)?
Do you know in 2016 , two nuclear powerplan in Belgium were locked down by terrorist?
Do you know that on 17-18 December 2016 Ukraine power blackout because cyberattack on powerplan system?
Terrorist attacking workstations and Supervisory Control and Data Acquisition (SCADA) systems. Cyber-attacks (by cyber terrorist or cyber-warframe that international conflicts) against Critical Infrastructures are gaining steam. Because stealth nature and potential to cause physical damage without deploying soldiers or utilizing traditional weapons, in many situations cyber-attack is the preferred method of attack.
Critical infrastructure is an asset or system which is essential for the maintenance of vital societal functions. The damage to a critical infrastructure, its destruction or disruption by natural disasters, terrorism, criminal activity or malicious behaviour, may have a significant negative impact for the security of country and the well-being of its citizens.
The following sectors and industries are widely considered to be critical infrastructure:
Sectors | Industries |
Energy | • Electricity
• Natural gas • Oil |
Information and Communication Technology (ICT) | • Telecommunications (including satellites)
• Broadcasting systems • Software, hardware and networks (including the Internet) |
Traffic and transportation | • Shipping
• Aviation • Rail transport • Road traffic • Logistics |
Healthcare | • Healthcare
• Medicines and vaccines • Laboratories |
Water supply | • Dams
• Storage • Treatment and distribution networks |
Finance and insurance | • Banks
• Stock exchanges • Insurance companies • Financial services |
Government and administration | • Government
• Parliament • Legal institutions • Emergency services |
Nutrition and agriculture | • Food trade
• Agriculture |
Media and cultural assets | • Radio
• Press • Symbolic buildings |
Source : National Infrastructure Protection Plan (NIPP), p. 109: U.S. Department of Homeland Security.
Cyber-attack or cyber-threat on Critical Infrastructure (CI) it have various type, but usually may include :
- Manipulate system or data – such as malware that exploit vulnerabilities in computer software and hardware components necessary for operation of CI’s;
- Shutdown crucial system – such as DDoS attacks;
- Limit access to crucial systems or information – such as through ransomware attack.
While interconnected and integrated computerized control system have significantly streamlined the way in which CIs operated and increased connectivity that mean also increase the attack surface and therefore expose Cis to a high risk of manipulation. There is table of threat in Industrial Control System :
No. | Threat | Explanation |
1 | Unauthorized use of remote maintenance access points | Maintenance access points are deliberately created external entrances to the ICs network and are often insufficiently secure |
2 | Online attacks via office or enterprise networks | Office IT is usually linked to the network in several ways.
In most case, network connection from offices to the ICS network also exist, so attacker can gain access via this route. |
3 | Attacks on standard components used in the Cis network | Standard IT components (commercial off-the-shelf) such as systems software, application servers or databases often contain flaws or vulnerabilities, which can be exploited by attackers. If these standard components are also used in the ICs network, the risk of a successful attack on the ICs network increases. |
4 | DDoS attacks | Distributed Denial of Services attacks can impair network connection and essential resources and cause systems to fail – in order to disrupt the operation of ICs, for instance. |
5 | Human error and sabotage | Intentional deeds – whether by internal or external perpretators – are a massive threat to all protection targets. Negligence and human error are also a great threat, especially in relation to the protection targets confidentiality and availability. |
6 | Introducing malware via removable media and external hardware | The use of removable media and mobile IT components of external staff always entails great risk of malware infection. |
7 | Reading and writing news in the ICs network | Most control components currently use clear text protocols, so communication is unprotected. This makes it relativelyeasy to read and introduce control commands. |
8 | Unauthorized access to resources | Internal perpetrators and subsequent attacks following initial external penetration have it especially easy if services and components in the process network do not utilize authentication methods or if the methods are insecure. |
9 | Attacks on network components | Attacekrs can manipulate network component in order to carry out man-in-the-middle attacks or to make sniffing easier, for example. |
10 | Technical Malfunctions or force majeure | Outage resulting from extreame weather or technical malfunctions can occur at any time – risk and potential damage can only be minimazes in such cases. |
Source : OSCE 2013
Bims.
It’s genuinely very complex in this busy life to listen news on Television, so I only use internet for that reason, and take the most up-to-date news.
Howdy! I know this is somewhat off topic but I was wondering which blog platform are you using for this website?
I’m getting fed up of WordPress because I’ve had problems
with hackers and I’m looking at alternatives for another platform.
I would be great if you could point me in the direction of a good
platform.
먹튀검증 먹튀사이트 먹튀폴리스입니다.
신규는 물론 오픈된 먹튀사이트를 철저히
검증하여 먹튀없는 시대를 만들어가고 있습니다.
먹튀폴리스를 사랑하는 여러분의 많은 호응바랍니다.
여러분의 충실한 검증사이트가 되도록
노력하겠습니다.
Thanks for your personal marvelous posting! I genuinely enjoyed reading it, you’re
a great author. I will ensure that I bookmark your blog
and will eventually come back sometime soon. I want to encourage you to continue your great writing, have a nice morning!
It’s enormous that you are getting thoughts from this article as
well as from our dialogue made at this time.
Excellent blog you have here.. It’s difficult
to find quality writing like yours these days. I honestly appreciate
people like you! Take care!!
Excellent post. I certainly love this site. Continue the good work!
by UFA350.com
Hi there, everything is going well here and ofcourse every
one is sharing information, that’s genuinely fine, keep up
writing. by slot007.com
highlight [url=https://cialsagen.com/#]can you buy viagra over the counter[/url] cheap viagra online canadian pharmacy can i buy viagra without a prescription maintenance https://cialsagen.com/
Every weekend i used to visit this web page, as i wish for enjoyment,
since this this web site conations in fact fastidious funny material too.
Wonderful goods from you, man. I’ve understand your stuff previous to and you are just extremely excellent.
I really like what you have acquired here, certainly
like what you are saying and the way in which you say it.
You make it enjoyable and you still take care of to keep it sensible.
I can’t wait to read far more from you. This is actually a great
website.
Someone necessarily lend a hand to make severely articles I would state.
This is the very first time I frequented your website
page and so far? I amazed with the analysis you made to create this actual
publish amazing. Wonderful activity!
Good post! We will be linking to this great article on our site.
Keep up the good writing.
I am sure this paragraph has touched all the internet visitors, its really
really pleasant post on building up new webpage.
Yes! Finally someone writes about News. by Huay350.com
Hiya! I know this is kinda off topic but I’d figured I’d ask.
Would you be interested in trading links or maybe guest
authoring a blog article or vice-versa? My
website goes over a lot of the same subjects as yours and I think we
could greatly benefit from each other. If you are interested
feel free to send me an e-mail. I look forward to
hearing from you! Superb blog by the way!
Thanks for every other great post. Where else may anybody get that type of info in such an ideal approach
of writing? I’ve a presentation next week, and I’m on the look for such information.
Someone necessarily lend a hand to make significantly posts I might state.
This is the very first time I frequented your website page and
so far? I surprised with the analysis you made to create this actual put up amazing.
Magnificent task!
Hi there! This is my 1st comment here so I just wanted to give a quick shout out and tell you I genuinely enjoy reading through
your posts. Can you recommend any other blogs/websites/forums that go over the same
topics? Thanks a ton!
Hi there! This is kind of off topic but I need some
help from an established blog. Is it very hard to set up your own blog?
I’m not very techincal but I can figure things out pretty
quick. I’m thinking about creating my own but I’m not sure
where to start. Do you have any ideas or suggestions?
Cheers