Critical Infrastructure Control Systems Vulnerabilities

Salvato in:
Dettagli Bibliografici
Pubblicato in:International Conference on Information Warfare and Security (Apr 2010), p. 106-113
Autore principale: Graddy, Marchello
Altri autori: Strouble, Dennis
Pubblicazione:
Academic Conferences International Limited
Soggetti:
Accesso online:Citation/Abstract
Full Text
Full Text - PDF
Tags: Aggiungi Tag
Nessun Tag, puoi essere il primo ad aggiungerne!!

MARC

LEADER 00000nab a2200000uu 4500
001 869617379
003 UK-CbPIL
035 |a 869617379 
045 2 |b d20100401  |b d20100430 
084 |a 142229  |2 nlm 
100 1 |a Graddy, Marchello 
245 1 |a Critical Infrastructure Control Systems Vulnerabilities 
260 |b Academic Conferences International Limited  |c Apr 2010 
513 |a Feature 
520 3 |a As computer technology has permeated much of today's society, the interconnectedness of the world can be viewed as both an economic advantage and a security weakness. The networked world has nourished an environment in which cyber warfare can flourish. Cyber warfare has become a desired mode of fighting when attacking a highly industrialized and wired nation. Nations throughout the world are developing and executing cyber warfare strategies to disrupt their enemy's communications, logistics, transportation and military infrastructures. One of the most powerful attacks that can be rendered on a nation's ability to make war is a cyber attack on the computerized systems that control its critical infrastructure. Critical infrastructure includes a nation's communications, public works, financial and utility institutions. In the United States, the utility infrastructure control systems were designed as non-networked, stand alone entities to prevent unauthorized infiltration. With the privatization of utility services, these systems are now being integrated with corporate communication infrastructures in an effort to achieve cost savings and are now vulnerable to attack. The systems, with their dedicated software and hardware, are unable to be patched to address security concerns. Additionally, when utility services upgrade their control systems, budgetary constraints force them to select a commercially available software packages that are available throughout the world. These programs can also be purchased by the enemies of the state and then manipulated to gain knowledge of the system that can result in unfettered access to the nation's critical infrastructure control systems. Although public and private organizations throughout the nation have taken the initiative and made small strives in security, more must be done. The government of the United States must develop and enforce standards on infrastructure control systems to safeguard the nation's lifeblood, its critical infrastructure. This paper provides a non-technical overview of the United States' critical utility infrastructure control systems. The overview includes the proliferation of their use, their history, security threats and incidents. Also highlighted are some of the initiatives that both public and private organizations have taken to address this issue. Finally recommendations to increase security are made. [PUBLICATION ABSTRACT] 
653 |a Software 
653 |a Intrusion detection systems 
653 |a Threats 
653 |a Distributed control systems 
653 |a Data processing 
653 |a Data encryption 
653 |a Internet 
653 |a Data acquisition systems 
653 |a Cybersecurity 
653 |a Manufacturing 
653 |a Nuclear power plants 
653 |a War 
653 |a Public finance 
653 |a Privatization 
653 |a Strength 
653 |a Electronic technology 
653 |a Security 
653 |a Public works 
653 |a Control systems 
653 |a Logistics 
653 |a Financial institutions 
653 |a Communication 
653 |a Infrastructure 
653 |a Cost control 
653 |a Connectedness 
653 |a Interlocking directorates 
653 |a Unauthorized 
653 |a Computerization 
700 1 |a Strouble, Dennis 
773 0 |t International Conference on Information Warfare and Security  |g (Apr 2010), p. 106-113 
786 0 |d ProQuest  |t Political Science Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/869617379/abstract/embedded/ZKJTFFSVAI7CB62C?source=fedsrch 
856 4 0 |3 Full Text  |u https://www.proquest.com/docview/869617379/fulltext/embedded/ZKJTFFSVAI7CB62C?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/869617379/fulltextPDF/embedded/ZKJTFFSVAI7CB62C?source=fedsrch