Blog Posts Tagged with "Air Gap"


How Practical is a Disconnected Network?

September 10, 2012 Added by:Rafal Los

Air-gapped networks are difficult to maintain, and what happens when you have to transfer data from that air-gapped network to somewhere else. What if you have to install printer drivers or update your anti-virus signatures? Doesn't sound so easy to do now, does it?

Comments  (2)


On Air Gaps and Killer Toothbrushes

May 28, 2012 Added by:Chris Blask

Air gaps do not and should not exist. Patching vulnerabilities won't make systems secure. Standards and regulations are here to stay. The threat will surpass our ability to tolerate it long before we can re-engineer and re-deploy every vulnerable system. These are all just facts...

Comments  (2)


Protecting SCADA Systems with Air Gaps is a Myth

May 21, 2012 Added by:Headlines

Speaking at AusCERT, SCADA security expert Eric Byres stated that “the whole concept of trying to protect SCADA systems with air gaps is a myth" perpetuated by those who believe "bad things will never happen to the control systems..."

Comments  (7)


The FUD Files: Cyber Attacks on Our Water Systems

November 20, 2011 Added by:Infosec Island Admin

Sure, the vulnerable system was online for anyone to hit up AND it was in such an un-secured state that pretty much anyone with a pulse could have messed with it. However, The FUD response from the government and the media will be the real disaster that will cause the most damage...

Comments  (1)


Network Security and Mandatory Disclosure

October 10, 2011 Added by:Craig S Wright

Security disclosures can have an impact on a company’s share price. Some organisations actually have no economic impact from a breach. For others, the effect is catastrophic. But, security through obscurity is simply false security and leaves us vulnerable with no way to measure the true risk...

Comments  (2)


SCADA: Air Gaps Do Not Exist

September 26, 2011 Added by:Craig S Wright

There are a multitude of systems that simply need to be crashed, not controlled using an automated tool without human interaction. A human with control of a RAT does not need to write a variant for each system. They simply need to take control of the underlying operating system...

Comments  (1)