Blog Posts Tagged with "ICS"

A966b1b38ca147f3e9a60890030926c9

ICS Cybersecurity: Water, Water Everywhere

November 21, 2011 Added by:Chris Blask

Monitoring of water treatment networks using common SIEM or log management tools offers the kind of capability that can address the need for visibility into control system behavior. The ICS networks found in water facilities are deterministic systems with highly predictable behavior...

Comments  (4)

Ecadf7bc12303bf9d93a73b5ea4a6ace

Getting Smacked in the Face Over TCP

November 21, 2011 Added by:Robin Jackson

Those who see concerted nation-state cyber attacks in every compromised system are like the little boy who cried "Stuxnet" whenever a control system is hacked and those who poo-poo the vulnerabilities that come to light are like the little pig who built his house of straw and said "I'm safe"...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

The FUD Files: Cyber Attacks on Our Water Systems

November 20, 2011 Added by:Infosec Island Admin

Sure, the vulnerable system was online for anyone to hit up AND it was in such an un-secured state that pretty much anyone with a pulse could have messed with it. However, The FUD response from the government and the media will be the real disaster that will cause the most damage...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

South Houston's Water Supply Network Hacked

November 18, 2011 Added by:Headlines

"No damage was done to any of the machinery; I don't really like mindless vandalism. It's stupid and silly. On the other hand, so is connecting interfaces to your SCADA machinery to the internet... This required almost no skill and could be reproduced by a two year old..."

Comments  (0)

Aadb52f9100e0d31264fb3ce9e3d2536

US Water System Hacked: A Community-Wide Issue

November 18, 2011 Added by:Robert M. Lee

Information is still coming out on this event and the DHS has stated that they and FBI are still gathering information but believe none of the information so far indicates a risk to critical infrastructure. However, the concerns this incident raises are valid regardless...

Comments  (3)

7b072d611db66025d89ff3137dcddfb3

Are Web Services a Dumb Idea?

November 16, 2011 Added by:Joel Langill

First, you need to expand your concept of an “embedded web server” beyond something that a user would use when launching a browser and entering a URL for the device. Vendors actually use embedded web servers for a number of reasons, and many of these vendors are leaders in the industry...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Utility Cyber Security is in a State of Near Chaos

November 16, 2011 Added by:Headlines

"Utility cyber security is in a state of near chaos. After years of vendors selling point solutions, utilities investing in compliance minimums rather than full security, and attackers having nearly free rein, the attackers clearly have the upper hand..."

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Thoughts on the Ohio SCADA Security Symposium

November 15, 2011 Added by:Brent Huston

One of the largest identified issues among the conversations at the symposium was the idea that cooperation and coordination between control network operators and engineers and their peers on the traditional business-oriented IT staff is difficult, if not nearly impossible...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Stuxnet II Found in the Wild - Dubbed “Duqu”

October 19, 2011 Added by:Headlines

“Duqu’s purpose is to gather intelligence data and assets from entities such as industrial control system manufacturers in order to more easily conduct a future attack against another third party. The attackers are looking for information such as design documents..."

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Security Investment to Focus on Utility Control Systems

October 18, 2011 Added by:Headlines

“Unfortunately, one thing has not changed. Cyber security is still way behind the attackers. Even where strong countermeasures exist, they are not consistently deployed, and most sophisticated attackers look at smart grids from a systemic perspective..."

Comments  (0)

A966b1b38ca147f3e9a60890030926c9

Flying Blind in Critical Infrastructure

June 07, 2011 Added by:Chris Blask

Once you get your head around the idea that you cannot trust your cyber devices you find it fits with existing industrial ideology quite well. The answer is to do your best to build a reliable cyber system - just as you do with the physical assets - then monitor it like a convicted criminal...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Security Experts Launch Cybersecurity Index Resource

May 10, 2011 Added by:Headlines

The Index of Cyber Security is a measure of the risk to the corporate, industrial, and governmental information infrastructure. It is sentiment-based in recognition of the rapid change in cybersecurity threats and the state of cybersecurity metrics as a practical art...

Comments  (0)

Page « < 4 - 5 - 6 - 7 - 8 > »