Web Links Directory - Free human edited web sites directory  - Article Details
  • Active Links: 293839
  • Pending Links: 1287822
  • Todays Links: 0
  • Total Articles: 2460
  • Total Categories: 14
  • Sub Categories: 867

New Cyber Security Threats Designed to Compromise Critical Infrastructure

Date Added: December 01, 2011 05:07:02 AM
Author: Astal Mark
Category: Computers & Internet
Stuxnet – a cool look at fact versus fiction No-one could have missed the media blitz about the Stuxnet worm in late 2010, but the IT industry is well-known for hyping such events; just think Y2K ‘bug’. So what’s the real story with Stuxnet? Is it an isolated threat to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS), or a much broader threat to organisations that manage critical infrastructure? In this paper, we examine: • The actual threat that Stuxnet poses to critical infrastructure and industrial plants; • Why Industrial Control Systems (ICS) are vulnerable to cyber attacks; • The parallels between Stuxnet in ICS and targeted Trojans in other IT networks; and • How best to protect your enterprise against these emerging threats. NOT AN ISOLATED THREAT Stuxnet isn’t last year’s threat. ‘It was merely the first volley in what may amount to a cyber arms race,’ security consultant Eric Byres explained at AusCERT 2011. Others agree that Stuxnet could serve as a ‘deployment platform for follow-on worms.’ Indeed, a new worm clearly related to Stuxnet was reported in April 2011 and given the name STAR. We’ve seen how quickly new threats are adopted by cyber criminals against cyber security. ‘Although Stuxnet was designed to penetrate SCADA systems, those who don’t manage critical infrastructure can’t be complacent,’ says Michael Davis of Dark Reading. ‘They must understand how Stuxnet works and the potential damage this type of malware can do in more broad-based attacks on IT networks.’ A TICKING TIME BOMB? First, some background: Stuxnet is malware specifically designed to target SCADA systems built by Siemens and running Simatic WinCC software, usually in combination with Siemens’ PCS 7 control system. Stuxnet was discovered in mid 2009, and its ability to exploit un-patched Windows systems was soon demonstrated. As more was revealed about the worm, questions were raised about the vulnerability of National Critical Infrastructure (CNI) to Stuxnet. In July 2010, the Black Hat Security Conference in Las Vegas spawned headlines that warned of ‘a ticking time bomb’. Stuxnet contained a number of carefully crafted components – including a Trojan and a rootkit - which experts said required insider knowledge, stolen design documents and security certificates for its development. German security researcher Ralph Langner wrote that Stuxnet had been ‘assembled by a highly qualified team of experts’ and suggested that ‘the resources needed to stage this attack pointed to a nation state. Soon after, the BBC confirmed that Stuxnet had hit computers at Iran’s Bushehr nuclear plant, and repeated that the worm could only have been created by a ‘nation state’. Security guru Eugene Kaspersky said of Stuxnet, ‘….this is the turning point; this piece of malware was designed to sabotage plants, to damage industrial systems. I am afraid this is the beginning of a new world ... a new era of cyberwars and cyberterrorism.’
You must be logged in to leave a rating.
Average rating: (0 votes)

No Comments Yet.

You must be logged in to leave a Comment.
How to remove link from Wldirectory
Here is the short description, how to remove your link, if you no longer need it.
Get started with jewellery online shopping and find yourself many discounts and offers to avail
Today, Internet is the most versatile tools in the field of marketing. People generally uses it, as to advertise their business and products, as to attaing more and more money and also to get some merchandise.
Shared Hosting Cons And Professionals
Tie this to the fact that Bluehost offer a one month, full money back guarantee if you are unsatisfied for just about any cause. This would be particularly so as it pertains to multiple web hosting.of datacenters.
Monster Beats Headphones Outlet
A center channel is also included. When you are experienced enough, try your hand on starting your own recording studio.
Are you purchasing quality furniture?
When it comes to purchasing furniture you have so many places to choose from.