Do you know that The Stuxnet worm, discovered in 2010, succeeded in infecting the most secure nuclear facilities by using physical devices (USB flash drives)?
Do you know in 2016 , two nuclear powerplan in Belgium were locked down by terrorist?
Do you know that on 17-18 December 2016 Ukraine power blackout because cyberattack on powerplan system?
Terrorist attacking workstations and Supervisory Control and Data Acquisition (SCADA) systems. Cyber-attacks (by cyber terrorist or cyber-warframe that international conflicts) against Critical Infrastructures are gaining steam. Because stealth nature and potential to cause physical damage without deploying soldiers or utilizing traditional weapons, in many situations cyber-attack is the preferred method of attack.
Critical infrastructure is an asset or system which is essential for the maintenance of vital societal functions. The damage to a critical infrastructure, its destruction or disruption by natural disasters, terrorism, criminal activity or malicious behaviour, may have a significant negative impact for the security of country and the well-being of its citizens.
The following sectors and industries are widely considered to be critical infrastructure:
Sectors | Industries |
Energy | • Electricity
• Natural gas • Oil |
Information and Communication Technology (ICT) | • Telecommunications (including satellites)
• Broadcasting systems • Software, hardware and networks (including the Internet) |
Traffic and transportation | • Shipping
• Aviation • Rail transport • Road traffic • Logistics |
Healthcare | • Healthcare
• Medicines and vaccines • Laboratories |
Water supply | • Dams
• Storage • Treatment and distribution networks |
Finance and insurance | • Banks
• Stock exchanges • Insurance companies • Financial services |
Government and administration | • Government
• Parliament • Legal institutions • Emergency services |
Nutrition and agriculture | • Food trade
• Agriculture |
Media and cultural assets | • Radio
• Press • Symbolic buildings |
Source : National Infrastructure Protection Plan (NIPP), p. 109: U.S. Department of Homeland Security.
Cyber-attack or cyber-threat on Critical Infrastructure (CI) it have various type, but usually may include :
- Manipulate system or data – such as malware that exploit vulnerabilities in computer software and hardware components necessary for operation of CI’s;
- Shutdown crucial system – such as DDoS attacks;
- Limit access to crucial systems or information – such as through ransomware attack.
While interconnected and integrated computerized control system have significantly streamlined the way in which CIs operated and increased connectivity that mean also increase the attack surface and therefore expose Cis to a high risk of manipulation. There is table of threat in Industrial Control System :
No. | Threat | Explanation |
1 | Unauthorized use of remote maintenance access points | Maintenance access points are deliberately created external entrances to the ICs network and are often insufficiently secure |
2 | Online attacks via office or enterprise networks | Office IT is usually linked to the network in several ways.
In most case, network connection from offices to the ICS network also exist, so attacker can gain access via this route. |
3 | Attacks on standard components used in the Cis network | Standard IT components (commercial off-the-shelf) such as systems software, application servers or databases often contain flaws or vulnerabilities, which can be exploited by attackers. If these standard components are also used in the ICs network, the risk of a successful attack on the ICs network increases. |
4 | DDoS attacks | Distributed Denial of Services attacks can impair network connection and essential resources and cause systems to fail – in order to disrupt the operation of ICs, for instance. |
5 | Human error and sabotage | Intentional deeds – whether by internal or external perpretators – are a massive threat to all protection targets. Negligence and human error are also a great threat, especially in relation to the protection targets confidentiality and availability. |
6 | Introducing malware via removable media and external hardware | The use of removable media and mobile IT components of external staff always entails great risk of malware infection. |
7 | Reading and writing news in the ICs network | Most control components currently use clear text protocols, so communication is unprotected. This makes it relativelyeasy to read and introduce control commands. |
8 | Unauthorized access to resources | Internal perpetrators and subsequent attacks following initial external penetration have it especially easy if services and components in the process network do not utilize authentication methods or if the methods are insecure. |
9 | Attacks on network components | Attacekrs can manipulate network component in order to carry out man-in-the-middle attacks or to make sniffing easier, for example. |
10 | Technical Malfunctions or force majeure | Outage resulting from extreame weather or technical malfunctions can occur at any time – risk and potential damage can only be minimazes in such cases. |
Source : OSCE 2013
Bims.
Hi there, just wanted to mention, I enjoyed this post.
It was inspiring. Keep on posting!
The other day, while I was at work, my cousin stole my iPad
and tested to see if it can survive a 25 foot drop, just so she can be a youtube sensation.
My iPad is now destroyed and she has 83 views.
I know this is entirely off topic but I had to share it
with someone!
Have you ever considered writing an ebook or guest authoring on other websites?
I have a blog based on the same information you discuss and would
love to have you share some stories/information. I know my readers would appreciate
your work. If you are even remotely interested, feel free to shoot me an e
mail.
hacklink satın al cialis fiyat viagra.
If some one needs to be updated with newest technologies afterward he must be visit this
web site and be up to date everyday.
This blog was… how do you say it? Relevant!!
Finally I’ve found something that helped me. Thank you!
We are a gaggle of volunteers and opening a brand new scheme in our community.
Your site provided us with valuable information to work on. You have done an impressive process and our whole
neighborhood might be thankful to you.
I’m not sure where you are getting your info,
but good topic. I needs to spend some time learning much more or understanding more.
Thanks for fantastic info I was looking for this info for my mission.
Thanks for your marvelous posting! I certainly enjoyed reading it,
you’re a great author. I will be sure to bookmark your blog
and will often come back sometime soon. I want to encourage you continue your great writing, have a nice day!
Write more, thats all I have to say. Literally, it seems as though you relied on the video to
make your point. You clearly know what youre talking about, why waste
your intelligence on just posting videos to your weblog when you
could be giving us something enlightening to read?
At this moment I am ready to do my breakfast, after
having my breakfast coming again to read more news.
hello there and thank you for your info – I’ve certainly picked up something new from right here.
I did however expertise several technical points using this website,
as I experienced to reload the site lots of times previous to I
could get it to load correctly. I had been wondering if your hosting is
OK? Not that I’m complaining, but sluggish loading instances times will very
frequently affect your placement in google and could damage
your high quality score if advertising and marketing with Adwords.
Anyway I’m adding this RSS to my email and could look out for a
lot more of your respective fascinating content. Ensure that you update this
again soon.
It’s an awesome paragraph designed for all the online
people; they will obtain advantage from it I am sure.
Whats up very nice blog!! Man .. Excellent .. Amazing ..
I’ll bookmark your blog and take the feeds also? I am happy to seek out numerous helpful information right here in the put up, we need work out more
strategies on this regard, thank you for sharing.
. . . . .
Thanks , I’ve just been searching for info approximately this subject for ages and yours is
the greatest I’ve discovered so far. However, what in regards to the conclusion? Are you certain about the source?
I used to be recommended this web site by means of my cousin.
I am not sure whether or not this put up is written via him as nobody else recognize
such targeted about my trouble. You are amazing!
Thanks!
Hello mates, fastidious piece of writing and fastidious urging commented here, I
am in fact enjoying by these.
Hi! I know this is somewhat off topic but I was wondering which blog platform
are you using for this site? I’m getting sick and tired of WordPress
because I’ve had problems with hackers and I’m looking at alternatives for another platform.
I would be fantastic if you could point me in the
direction of a good platform.
Its not my first time to go to see this web site, i am browsing this website dailly and get fastidious facts from here daily.
Nice blog here! Also your website loads up fast!
What host are you using? Can I get your affiliate link to your host?
I wish my web site loaded up as fast as yours lol