Free And Open Souce Software: An Invitation To Cyberattack

Tallennettuna:
Bibliografiset tiedot
Julkaisussa:Association for Engineering Education - Engineering Library Division Papers (Jun 12, 2005), p. 10.642.1
Päätekijä: Kaplan, Kathleen
Julkaistu:
American Society for Engineering Education-ASEE
Aiheet:
Linkit:Citation/Abstract
Full text outside of ProQuest
Tagit: Lisää tagi
Ei tageja, Lisää ensimmäinen tagi!

MARC

LEADER 00000nab a2200000uu 4500
001 2318014473
003 UK-CbPIL
035 |a 2318014473 
045 0 |b d20050612 
100 1 |a Kaplan, Kathleen 
245 1 |a Free And Open Souce Software: An Invitation To Cyberattack 
260 |b American Society for Engineering Education-ASEE  |c Jun 12, 2005 
513 |a Conference Proceedings 
520 3 |a “Forget about viruses; America's real cybersecurity concerns are the notoriously vulnerable systems that control our power and water supplies” [34]. Cyberattack is a concern for all technological societies, including the United States (US). The greatest concern with respect to cyberattacks is in our critical infrastructures; these include communications, oil and gas refineries, power plants, and water and waste control, which are all associated with engineering. The protection of these utilities is vital to the welfare of the US, yet they are becoming more difficult to protect given the “openness” prevalent in our society. Critical infrastructures are controlled by SCADA (Supervisory Control And Data Acquisition) software applications which are programs for process control. Some SCADA systems are being rewritten with FOSS (Free and Open Source Software) instead of proprietary software. The reasons for this change from proprietary to FOSS software are many and diverse, and include government and cost requirements. This may prove to be a major mistake as FOSS may be more vulnerable to cyberattack than non-FOSS. The use of Free and Open-Source Software (FOSS) may make cyberattack easier than using non- FOSS. FOSS allows all users to study, change, and improve source code; unfortunately, this may give cyberterrorists first-hand knowledge of the intricate workings of FOSS or software built upon FOSS. While non-FOSS has also been vulnerable to attack, it does not allow the source code to be freely accessed, and thus software holes have to be found the hard way – by trial and error. As recent studies have shown, FOSS is used for many software applications, including critical infrastructure protection systems, and in all levels of government. This paper discusses different types of software "openness," FOSS and non-FOSS, pro and con arguments regarding FOSS, organizations using FOSS, and FOSS with respect to critical infrastructure protection. Also discussed with respect to FOSS are SCADA, critical infrastructure protection (CIP), hostile monitoring of SCADA systems, and breaches of SCADA systems. The information contained in this paper is important and relevant for all engineers involved with critical infrastructures. “Proceedings of the 2005 American Society for Engineering Education Annual Conference & Exposition Copyright © 2005, American Society for Engineering Education” 
651 4 |a United States--US 
653 |a Electric power generation 
653 |a Protection systems 
653 |a Source code 
653 |a Utilities 
653 |a Applications programs 
653 |a Engineering education 
653 |a Open source software 
653 |a Water supply 
653 |a Control systems 
653 |a Supervisory control and data acquisition 
653 |a Error analysis 
653 |a Power plants 
653 |a Software 
653 |a Refineries 
653 |a Freeware 
653 |a Infrastructure 
653 |a Process controls 
653 |a Critical infrastructure 
653 |a Cybercrime 
653 |a Cybersecurity 
653 |a Society 
653 |a Openness 
653 |a Government 
653 |a Engineering 
653 |a Vulnerability 
653 |a Education 
653 |a Property 
653 |a Computer viruses 
653 |a Power 
653 |a Copyright 
653 |a Protection 
653 |a Welfare 
773 0 |t Association for Engineering Education - Engineering Library Division Papers  |g (Jun 12, 2005), p. 10.642.1 
786 0 |d ProQuest  |t Library Science Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/2318014473/abstract/embedded/L8HZQI7Z43R0LA5T?source=fedsrch 
856 4 0 |3 Full text outside of ProQuest  |u https://peer.asee.org/free-and-open-souce-software-an-invitation-to-cyberattack