Do you know that The Stuxnet worm, discovered in 2010, succeeded in infecting the most secure nuclear facilities by using physical devices (USB flash drives)?
Do you know in 2016 , two nuclear powerplan in Belgium were locked down by terrorist?
Do you know that on 17-18 December 2016 Ukraine power blackout because cyberattack on powerplan system?
Terrorist attacking workstations and Supervisory Control and Data Acquisition (SCADA) systems. Cyber-attacks (by cyber terrorist or cyber-warframe that international conflicts) against Critical Infrastructures are gaining steam. Because stealth nature and potential to cause physical damage without deploying soldiers or utilizing traditional weapons, in many situations cyber-attack is the preferred method of attack.
Critical infrastructure is an asset or system which is essential for the maintenance of vital societal functions. The damage to a critical infrastructure, its destruction or disruption by natural disasters, terrorism, criminal activity or malicious behaviour, may have a significant negative impact for the security of country and the well-being of its citizens.
The following sectors and industries are widely considered to be critical infrastructure:
Sectors | Industries |
Energy | • Electricity
• Natural gas • Oil |
Information and Communication Technology (ICT) | • Telecommunications (including satellites)
• Broadcasting systems • Software, hardware and networks (including the Internet) |
Traffic and transportation | • Shipping
• Aviation • Rail transport • Road traffic • Logistics |
Healthcare | • Healthcare
• Medicines and vaccines • Laboratories |
Water supply | • Dams
• Storage • Treatment and distribution networks |
Finance and insurance | • Banks
• Stock exchanges • Insurance companies • Financial services |
Government and administration | • Government
• Parliament • Legal institutions • Emergency services |
Nutrition and agriculture | • Food trade
• Agriculture |
Media and cultural assets | • Radio
• Press • Symbolic buildings |
Source : National Infrastructure Protection Plan (NIPP), p. 109: U.S. Department of Homeland Security.
Cyber-attack or cyber-threat on Critical Infrastructure (CI) it have various type, but usually may include :
- Manipulate system or data – such as malware that exploit vulnerabilities in computer software and hardware components necessary for operation of CI’s;
- Shutdown crucial system – such as DDoS attacks;
- Limit access to crucial systems or information – such as through ransomware attack.
While interconnected and integrated computerized control system have significantly streamlined the way in which CIs operated and increased connectivity that mean also increase the attack surface and therefore expose Cis to a high risk of manipulation. There is table of threat in Industrial Control System :
No. | Threat | Explanation |
1 | Unauthorized use of remote maintenance access points | Maintenance access points are deliberately created external entrances to the ICs network and are often insufficiently secure |
2 | Online attacks via office or enterprise networks | Office IT is usually linked to the network in several ways.
In most case, network connection from offices to the ICS network also exist, so attacker can gain access via this route. |
3 | Attacks on standard components used in the Cis network | Standard IT components (commercial off-the-shelf) such as systems software, application servers or databases often contain flaws or vulnerabilities, which can be exploited by attackers. If these standard components are also used in the ICs network, the risk of a successful attack on the ICs network increases. |
4 | DDoS attacks | Distributed Denial of Services attacks can impair network connection and essential resources and cause systems to fail – in order to disrupt the operation of ICs, for instance. |
5 | Human error and sabotage | Intentional deeds – whether by internal or external perpretators – are a massive threat to all protection targets. Negligence and human error are also a great threat, especially in relation to the protection targets confidentiality and availability. |
6 | Introducing malware via removable media and external hardware | The use of removable media and mobile IT components of external staff always entails great risk of malware infection. |
7 | Reading and writing news in the ICs network | Most control components currently use clear text protocols, so communication is unprotected. This makes it relativelyeasy to read and introduce control commands. |
8 | Unauthorized access to resources | Internal perpetrators and subsequent attacks following initial external penetration have it especially easy if services and components in the process network do not utilize authentication methods or if the methods are insecure. |
9 | Attacks on network components | Attacekrs can manipulate network component in order to carry out man-in-the-middle attacks or to make sniffing easier, for example. |
10 | Technical Malfunctions or force majeure | Outage resulting from extreame weather or technical malfunctions can occur at any time – risk and potential damage can only be minimazes in such cases. |
Source : OSCE 2013
Bims.
Exceptional post however , I was wanting to know if you could write a litte more
on this topic? I’d be very grateful if you could elaborate
a little bit more. Thank you!
Wow! I don’t think so. And never simply nice publish”.
Have you ever thought about creating an ebook or guest authoring on other websites?
I have a blog based upon on the same information you discuss and would love to have you share some stories/information. I know my audience would enjoy your work.
If you are even remotely interested, feel free to shoot me an e mail.
Hi, I do believe this is an excellent blog. I stumbledupon it 😉 I’m going to come back once again since I
book-marked it. Money and freedom is the greatest way to change, may you be rich and continue to help
other people.
I am sure this article has touched all the internet viewers, its really really fastidious
article on building up new blog.
hi!,I really like your writing so a lot! proportion we be in contact extra about your article on AOL?
I require a specialist on this space to resolve my problem.
May be that’s you! Taking a look forward to peer you.
Miles de Películas y series Online en calidad HD, Castellano y Subtitulado sin cortes.
Pelisplus.
awesome .. i would recommend you to go through https://ytbuyviews.com/ and get it promoted on social media with full support and guarantee. Also, get quick views, comments, subscribers and followers.
I am a 28 year old attorney and keen partime writer
from Wimauma, Florida. I’m a little bit of a techy with a keen fascination with the world wide
web, digital media, and more specifically portable devices
and technology. I’ve been posting on and off since 2003 with the goal of clarifying mobile technology into plain English.
I feel this is among the so much important info for me.
And i’m satisfied reading your article. However wanna commentary on some basic issues, The web
site style is wonderful, the articles is in point of fact
great : D. Just right job, cheers
Post writing is also a excitement, if you be acquainted with then you can write if not it is complicated to write.
If you want something changed, cropped differently, or perhaps in any manner altered,
you have somebody that will perform this for you (in many cases included at no extra cost).
It’s not the amount information are you able to cram to
your head in the past but, the amount information it is possible to actually retain that creates that you
learn faster and much more efficiently. For the Dalai Lama, the spiritual leader from the
Gelug sect of Tibetan Buddhism, being so acknowledged
as one of the most influential person with the year within the western world is an ideal
example in the respect we have to all show toward other religions and the acceptance of views that do not effectively
always mirror our own.
Wow, this piece of writing is good, my sister is analyzing these kinds of things, thus I am going to inform her.
While these articles can be published in newspapers and magazines, the author can also print these articles as a book.
In the chat type, as in the article, there are introduction and improvement sections; however, it differs from the article in that it is written in the atmosphere of mutual speech and that the disclosed thoughts are heard without the need for proof.
The writer often tells about his personal thoughts in the chat type, so the https://www.islamisohbet.com.tr type has a subjective narrative.
Ƭhis is very interеsting, You’re a very skilled blogger.
I hаve joied your rss feeԀ and oߋk forward to seeking more of your fantastic
post. Alѕo, I have sһarded your website in my social netwߋгks!
Fantastic post however , I was wondering if you could write a litte more on this topic?
I’d be very grateful if you could elaborate a little bit further.
Thanks!
cialis hacklink güvenilir satın alma.
I couldn’t resist commenting. Perfectly written!
Hello i am kavin, its my first time to commenting anyplace,
when i read this post i thought i could also make comment due to this brilliant piece of writing.
Admiring the dedication you put into your blog and in depth information you present.
It’s good to come across a blog every once in a while that isn’t the
same out of date rehashed information. Wonderful read!
I’ve saved your site and I’m including your RSS feeds to my Google
account.