Chemical & Engineering News Digital Edition ... - IMM@BUCT
Chemical & Engineering News Digital Edition ... - IMM@BUCT
Chemical & Engineering News Digital Edition ... - IMM@BUCT
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
e exploited, even those considered lowrisk.<br />
“If someone decides specifically to go<br />
after your organization, it is going to be very<br />
difficult to prevent them from breaking<br />
in,” he says. This gives the chemical sector<br />
reason to be concerned that DHS’s system<br />
could be breeched, resulting in an unintended<br />
dissemination of high-risk facilities’<br />
security and vulnerability information.<br />
Although DHS requires high-risk facilities<br />
to address cybersecurity challenges,<br />
including cybersecurity in a plant’s overall<br />
security profile is a good business practice,<br />
says Christine Adams, director of the<br />
<strong>Chemical</strong> Sector Cyber Security Program<br />
for industry trade group American Chemistry<br />
Council (ACC) and a senior information<br />
systems manager at Dow <strong>Chemical</strong>.<br />
The fact that much of the chemical industry<br />
is made up of automated processing<br />
plants that handle large quantities of dangerous<br />
materials not only makes it a target<br />
for terrorist attacks but for cyber attacks,<br />
too, according to Ritchey and Singer.<br />
And adding to industry’s vulnerability<br />
are the sector’s extensive computer networks,<br />
which circle the globe and provide<br />
FUELING CONCERN is the fact that the<br />
Federal Bureau of Investigation is currently<br />
examining thousands of cyber attacks.<br />
Already, the FBI has noticed that the usual<br />
suspects are evolving, changing tactics, and<br />
increasing the sophistication of their attacks.<br />
For example, in the past, cyber assailants<br />
did not associate with each other, but now<br />
virtual gangs are a growing threat, according<br />
to Shawn Henry, assistant director of the<br />
FBI’s Cyber Division. Hackers are banding<br />
together to pool their expertise and carry<br />
out coordinated attacks, he said at a briefing<br />
in Washington, D.C., on Oct. 17.<br />
Cyber experts with Booz Allen Hamilton<br />
also agree that attackers’ tactics are changing<br />
to become more sophisticated and,<br />
they say, more prevalent.<br />
When it comes to breeching a system,<br />
Ritchey says targeting an individual who<br />
has broad access within an organization<br />
with the intention of stealthily extracting<br />
information or waging an attack is the<br />
simplest way for a cyber assailant to affect<br />
companies in the chemical industry. He<br />
says the industry is extremely vulnerable to<br />
such “targeted phishing attacks.”<br />
For example, Ritchey explains, a company<br />
employee could receive an e-mail that<br />
says: “Hey Joe, I saw you talking on such and<br />
such a topic. The attached report might interest<br />
to you.” The attached file may in fact<br />
be interesting, relevant, and appear completely<br />
authentic, Ritchey says, but when Joe<br />
opens the file, his user profile, computer, or<br />
network could be compromised without Joe<br />
even knowing. “At this point the attackers<br />
have control,” Ritchey tells C&EN.<br />
This scenario could cause problems for a<br />
company and for its employees, who could<br />
become suspects if information such as<br />
user names and passwords were used by<br />
perpetrators to coordinate an attack.<br />
The fear of what terrorists might do<br />
if they had access to valuable business<br />
information or learned how to remotely<br />
control a manufacturing process is one of<br />
the reasons that DHS has included cybersecurity<br />
when evaluating a chemical facility’s<br />
risk of attack, agency officials note.<br />
Whether you are looking for a simple instrument for a teaching lab<br />
or a sophisticated research instrument, Shimadzu FTIR<br />
spectrophotometers have you covered. Our instruments provide<br />
outstanding performance and specifications that will give you<br />
comfort with the quality of your data.<br />
Delivering optimum FTIR performance, sensitivity, and reliability,<br />
the IRPrestige-21 features a S/N ratio of 40,000:1 and expansion<br />
capabilities to the Near IR and Far IR ranges. Superior to generalpurpose<br />
instruments, the new IRAffinity-1 FTIR is ideal for highprecision<br />
infrared analysis to confirm, identify and detect foreign<br />
matter in a multitude of application areas.<br />
These powerful instruments feature:<br />
Q Long-term stability via a patented flexible joint system and a<br />
dynamic alignment mechanism<br />
Q High-sensitivity DLATGS detector<br />
Q Increased reliability with self-diagnosis at initialization and<br />
continuous monitoring of instrument during operation<br />
Q Protection from humidity with a triple protection interferometer<br />
Q Analysis support programs<br />
Q Compatibility with a wide range of accessories, including the<br />
completely automated AIM-8000 microscope<br />
IRsolution software emphasizes operability with specialized<br />
windows. A variety of optional programs and accessories,<br />
such as those facilitating PLS and multilinear<br />
regression, deconvolution, and mapping<br />
measurement, are also available.<br />
Shimadzu FTIR spectrophotometers clearly<br />
deliver maximum performance and value.<br />
You demand performance and productivity—<br />
Shimadzu delivers.<br />
Learn more about Shimadzu’s FTIR products.<br />
Call (800) 477-1227 or visit us online at<br />
www.ssi.shimadzu.com/FTIR<br />
Shimadzu Scientific Instruments Inc., 7102 Riverwood Dr., Columbia, MD 21046, U.S.A.<br />
Order consumables and accessories on-line at http://store.shimadzu.com<br />
WWW.CEN-ONLINE.ORG 19 NOVEMBER 3, 2008