To kill a centrifuge PDF (Industrial control systems are vulnerable.)
...........
To kill a centrifuge PDF (The Langner Group PDF about cyber defense in and industrial environment.)
..........
..........
(I watched a program on PBS last night on Stuxnet. So I have read some more information about the code that infects industrial control systems. Its not a virus but it acts like a virus at the machine level. The Stuxnet code was developed by people under the control and working for a government. It was developed specifically to target Irans bomb making ability. The bad news is its been transported out of Iran and is now in the public domain.
The pdf link below explains in detail what this means for the future of cyber-physical-attacks and its not good. I took the time to read the pdf file titled: To kill a centrifuge. After reading this PDF file about the Stuxnet code I am now more aware of what cyber attacks can do. I think its good information to read and become more informed about what the real story behind the Stuxnet attack and the potential for more.
After reading this Bubba you will know our national defense against "cyber attacks" is as wide open as the borders are to illegal aliens like obama.) Story Reports
.........
.........
.........
To kill a centrifuge PDF (The Langner Group PDF about cyber defense in and industrial environment.)
.........
.........
.........
Intrusion detection (Page 22 of PDF)
"From a technical point of view, the intriguing idea to detect sophisticated cyber-
physical attacks in network traffic is completely unvalidated. In this respect, the
US Department of Defense’s claim of defending the nation at network speed certainly does not extend to cyber-physical attacks.
Defending against them cannot be done in milliseconds, it requires years of organizational and architectural changes in potential target environments."
Page 23
"Basing national security on theories about adversaries’ motivations and wishful thinking on how to control them is a risky gamble."
"Cyber defense of critical national infrastructure is expected to be implemented
voluntarily by a dispersed private sector that feels little desire to address matters of national security by ill-coordinated risk management exercises that negatively affect the bottom line."
(Thats right Bubba the critical national infrastructure defense depends on the private sector BOTTOM LINE! The government is shooting you a line of bull when it says it is, "Defending the nation at network speed.") Story Reports
........
........
........
The Langner Group (The Langner Group is an independent cyber defense consultancy specialized in critical infrastructure and large-scale manufacturing.)
To kill a centrifuge PDF (The Langner Group PDF about cyber defense in and industrial environment.)
Zero-day attack
A zero-day (or zero-hour or day zero) attack or threat is an attack that exploits a previously unknown vulnerability in a computer application, one that developers have not had time to address and patch. It is called a "zero-day" because the programmer has had zero days to fix the flaw (in other words, a patch is not available). Once a patch is available, it is no longer a "zero-day exploit". It is common for individuals or companies who discover zero-day attacks to sell them to government agencies for use in cyberwarfare.
........
........
........
(Keep in mind the industrial control world, where cyber physical attacks could occur, the nation's security depends voluntarily by a dispersed private sector that depends on their bottom line, $$$$. This is what the government is not telling the public and is revealed in the above PDF about STUXNET.) Story Reports
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment