Showing posts with label Infrastructure. Show all posts
Showing posts with label Infrastructure. Show all posts

Wednesday, December 5, 2012

Interesting tidbit about Radio Telescope & Solar Flares

http://www.gizmag.com/mwa-radio-telescope-solar-flares/25300/

Might wonder why I am blogging this here, since this is directly related to gaming.

Reason is that it is connected to Cyber Security, though loosely, power grid and communications are very vulnerable to Solar Flares and Solar Storms.

This project will help with some threats, but it can't really do anything to protect power grid from massive Solar Flare.

IMHO the overall security of the Power Grid, Communications, and Internet should consider all hazards or threats.

While striving for integrated solutions.

See these links for more on massive Solar Flares and damage they can do:

Thursday, November 15, 2012

Security & Hacking: Digital Bond on ICS & PLC lack of Security

http://www.digitalbond.com/blog/2012/11/13/two-conversations-last-week/

from link above:
"Our number 1 message – if the bad guys, malware or any other attack code gets to your ICS, he or it will be able to take down or control your process. The PLCs and controllers lack basic security to stop any attack. You have to secure your perimeter to the best degree possible and prevent even legitimate external access to the ICS, because those are attack paths.
Most executives do not understand how vulnerable their ICS are. When you explain it to them they are shocked … wait you mean there is no security at all???  Not even basic security like my ATM card? "


I don't think the public realizes what these things, the Industrial Control Systems and Programmable Logic Controllers, are or what they do.

If your not a specialist in the field, just think about these systems as Remote Controls (like the remote control for your TV) for the machines, switches, and valves used in Utilities and Industry.

Except, instead of infra red laser or radio that a TV Remote usually uses, these Remote Controls use the internet.

And when they were designed and built, no one really considered that anyone that wasn't supposed to play with the settings would even try to, so just like your TV remote control, there is no real security built into these remote controls.

So in very simple terms, what this means, is criminals/terrorist/etc can just use a specialized search engine, think like "Google" but specialized for finding these remote controls, and start messing with the channels on your "TV", turn it off, or maybe even do something like enter so many commands at once it gives the computer in the TV a heart attack and it dies from all the stress it wasn't made to handle.

But in this case the "TV" is actually the electrical substation the delivers power to your neighborhood, or to your hospital, or your kids school and a cold winter day.

Or it could be to the water treatment plant, so there is no clean water for drinking or anything else until the system is fixed, course, the minute the broken parts are fixed, the attacker could just wreck it again.

This is why a lot of security experts are making a lot of noise about this topic, they know there is a problem, and that something needs to be done about  it, but it is a really BIG problem, and they need help from you to put pressure on politicians and such to improve the situation.

Attacks already happen, see this link http://pipelineandgasjournal.com/hacking-industrial-scada-network for full story, snippet:
"It was a Trojan program inserted into SCADA system software that caused a massive natural gas explosion along the Trans-Siberian pipeline in 1982. A newspaper reported the resulting fireball yielded “the most monumental non-nuclear explosion and fire ever seen from space.”"

Tuesday, November 13, 2012

Security & Hacking: 2012 ICS Cyber Security Conference & Aurora

http://community.controlglobal.com/content/are-utilities-and-others-still-blinded-real-threat-aurora

You should read and follow that blog if your interested in Security, Hacking, ICS issues, etc.

Snipped from link above [I changed format slightly from original, words are the same]:
"Protective relays are not as secure as NERC or others would have you believe. Protective relays are not just used in electric substations but also protect large electric equipment in many industries. "

Friday, November 9, 2012

Security & Hacking: "Gary McGraw: Proactive defense prudent alternative to cyberwarfare"

http://searchsecurity.techtarget.com/news/2240169976/Gary-McGraw-Proactive-defense-prudent-alternative-to-cyberwarfare

Good, long, article that argues that the US (and I assume this applies equally to other countries) needs to develop much stronger Cyber defenses.

Also questions the utility of offensive Cyber ability, which I agree with, all you really do with that is teach lot of people how to conduct stronger attacks, though reality is politicians will tend to favor Cyber attacks often, because they are "bloodless" and have less negative impact to the politician making the decision than more obvious attacks.

But as this article also points out, with a very nice The Hobbit (novel) reference, that one of the problems with Cyber attacks, is that it isn't easy, or often even possible, to tell for sure who launched a cyber attack.

So Nations or Groups can attack a country like the US in a way that makes some other country or group the likely suspect (ie like framing someone in a crime drama).


Wednesday, October 31, 2012

Security & Hacking: US Infrastructure Enormous Vulnerabilities

Also seems like a lot of stupidity going on as well.

This article today from Sophos http://nakedsecurity.sophos.com/2012/10/31/nuclear-security-silence/ isn't anything new, see http://cliffsesportcorner.blogspot.com/2012/10/security-hacking-backdoor-in-computer.html

But this Quote of a Quote [I'm quoting Sophos, quoting Reuters article], illustrates just how messed up Infrastructure Security is, as well as the stupidity:
"In addition, attendees said they were alarmed to learn that because the government has kept a technique it discovered for attacking electricity generation equipment secret for five years, potential targets had not realized they were vulnerable and therefore did not buy hardware needed to protect themselves." 

Also might want to look at Basecamp, which is trying to raise public awareness to pressure politicians and business to improve situation http://www.digitalbond.com/tools/basecamp/

A bit technical, but most computer nerds should be able to follow it no problem.

Some Wikipedia articles that explain the acronyms.