Do you know that The Stuxnet worm, discovered in 2010, succeeded in infecting the most secure nuclear facilities by using physical devices (USB flash drives)?
Do you know in 2016 , two nuclear powerplan in Belgium were locked down by terrorist?
Do you know that on 17-18 December 2016 Ukraine power blackout because cyberattack on powerplan system?
Terrorist attacking workstations and Supervisory Control and Data Acquisition (SCADA) systems. Cyber-attacks (by cyber terrorist or cyber-warframe that international conflicts) against Critical Infrastructures are gaining steam. Because stealth nature and potential to cause physical damage without deploying soldiers or utilizing traditional weapons, in many situations cyber-attack is the preferred method of attack.
Critical infrastructure is an asset or system which is essential for the maintenance of vital societal functions. The damage to a critical infrastructure, its destruction or disruption by natural disasters, terrorism, criminal activity or malicious behaviour, may have a significant negative impact for the security of country and the well-being of its citizens.
The following sectors and industries are widely considered to be critical infrastructure:
Sectors | Industries |
Energy | • Electricity
• Natural gas • Oil |
Information and Communication Technology (ICT) | • Telecommunications (including satellites)
• Broadcasting systems • Software, hardware and networks (including the Internet) |
Traffic and transportation | • Shipping
• Aviation • Rail transport • Road traffic • Logistics |
Healthcare | • Healthcare
• Medicines and vaccines • Laboratories |
Water supply | • Dams
• Storage • Treatment and distribution networks |
Finance and insurance | • Banks
• Stock exchanges • Insurance companies • Financial services |
Government and administration | • Government
• Parliament • Legal institutions • Emergency services |
Nutrition and agriculture | • Food trade
• Agriculture |
Media and cultural assets | • Radio
• Press • Symbolic buildings |
Source : National Infrastructure Protection Plan (NIPP), p. 109: U.S. Department of Homeland Security.
Cyber-attack or cyber-threat on Critical Infrastructure (CI) it have various type, but usually may include :
- Manipulate system or data – such as malware that exploit vulnerabilities in computer software and hardware components necessary for operation of CI’s;
- Shutdown crucial system – such as DDoS attacks;
- Limit access to crucial systems or information – such as through ransomware attack.
While interconnected and integrated computerized control system have significantly streamlined the way in which CIs operated and increased connectivity that mean also increase the attack surface and therefore expose Cis to a high risk of manipulation. There is table of threat in Industrial Control System :
No. | Threat | Explanation |
1 | Unauthorized use of remote maintenance access points | Maintenance access points are deliberately created external entrances to the ICs network and are often insufficiently secure |
2 | Online attacks via office or enterprise networks | Office IT is usually linked to the network in several ways.
In most case, network connection from offices to the ICS network also exist, so attacker can gain access via this route. |
3 | Attacks on standard components used in the Cis network | Standard IT components (commercial off-the-shelf) such as systems software, application servers or databases often contain flaws or vulnerabilities, which can be exploited by attackers. If these standard components are also used in the ICs network, the risk of a successful attack on the ICs network increases. |
4 | DDoS attacks | Distributed Denial of Services attacks can impair network connection and essential resources and cause systems to fail – in order to disrupt the operation of ICs, for instance. |
5 | Human error and sabotage | Intentional deeds – whether by internal or external perpretators – are a massive threat to all protection targets. Negligence and human error are also a great threat, especially in relation to the protection targets confidentiality and availability. |
6 | Introducing malware via removable media and external hardware | The use of removable media and mobile IT components of external staff always entails great risk of malware infection. |
7 | Reading and writing news in the ICs network | Most control components currently use clear text protocols, so communication is unprotected. This makes it relativelyeasy to read and introduce control commands. |
8 | Unauthorized access to resources | Internal perpetrators and subsequent attacks following initial external penetration have it especially easy if services and components in the process network do not utilize authentication methods or if the methods are insecure. |
9 | Attacks on network components | Attacekrs can manipulate network component in order to carry out man-in-the-middle attacks or to make sniffing easier, for example. |
10 | Technical Malfunctions or force majeure | Outage resulting from extreame weather or technical malfunctions can occur at any time – risk and potential damage can only be minimazes in such cases. |
Source : OSCE 2013
Bims.
Get in action – Chances are that your wedding day photographer will “reserve” set as watching out the window, keeping your bridesmaids, sat on the bed with
your dress. If it is possible to find the
required time, why don’t you become an activist fighting to the bird’s right.
The Wedding Photography Las Vegas therefore turns out to be most high pressure
photography as the photographer offers this extra duty and responsibility to take out your family members in addition to their loving activities over the photography besides highlighting the bride
to be and also the bridegroom.
buy online hacklink viagra.
It’s actually very difficult in this active life to listen news on TV, thus I simply use web for that reason,
and take the most up-to-date information.
buy online hacklink viagra.
Excellent post. I’m dealing with a few of these issues as well..
Good day! This is kind of off topic but I need
some advice from an established blog. Is it difficult to set up your
own blog? I’m not very techincal but I can figure things
out pretty fast. I’m thinking about making my own but I’m not sure
where to begin. Do you have any ideas or suggestions?
With thanks
naturally like your web-site however you need to check the spelling on quite a few of your posts.
A number of them are rife with spelling issues and I to find it very bothersome to
tell the truth on the other hand I’ll definitely come back again.
hi!,I like your writing very so much! percentage we keep up a correspondence extra approximately your
post on AOL? I require a specialist in this house to solve my problem.
Maybe that is you! Looking forward to peer you.
At this moment I am going away to do my breakfast,
later than having my breakfast coming again to read other news.
Hi there, just wanted to tell you, I loved this article.
It was funny. Keep on posting!
Ahaa, its good dialogue about this piece of writing at this place at this blog, I have read all that,
so now me also commenting at this place.
Howdy! I understand this is kind of off-topic however I needed to ask.
Does managing a well-established website like yours take
a lot of work? I’m brand new to operating a blog but
I do write in my journal everyday. I’d like to start a blog
so I can easily share my own experience and thoughts online.
Please let me know if you have any ideas or tips for brand
new aspiring blog owners. Thankyou!
Wow, amazing weblog structure! How lengthy have you been blogging
for? you made blogging glance easy. The entire glance of your website is fantastic, let alone the content material!
bingo virtual programa
usa online bingo casinos
online gambling korea
Hello, just wanted to say, I loved this article. It was practical.
Keep on posting!
Some genuinely choice articles on this website, saved to
bookmarks.
This is very interesting, You’re a very skilled blogger.
I’ve joined your rss feed and look forward to seeking more of your
fantastic post. Also, I’ve shared your web site in my social networks!
Hi just wanted to give you a brief heads up and let you know a few of the pictures aren’t loading correctly.
I’m not sure why but I think its a linking
issue. I’ve tried it in two different browsers and both show the same outcome.
Hey I know this is off topic but I was wondering if you
knew of any widgets I could add to my blog that automatically tweet my newest twitter updates.
I’ve been looking for a plug-in like this for quite some time and was hoping maybe you would have some experience with something like this.
Please let me know if you run into anything. I truly enjoy reading your blog and
I look forward to your new updates.
Great article! That is the type of info that are meant
to be shared around the web. Disgrace on the seek
engines for no longer positioning this put
up upper! Come on over and discuss with my website . Thanks =)