12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

SUGGESTED FURTHER READING207would have knowledge of the system’s vulnerabilities—as Boden clearly had of the Maroochyplant. Finally, the damage caused by such a system more directly affects human lives than thecompromise of an IT system. The water contamination resulting from the release of the sewagein<strong>to</strong> the s<strong>to</strong>rmwater drain very likely affected many people in the Sunshine Coast.SUMMARYIn this chapter, we introduced industrial control systems, described aspects in which theydiffer from standard IT systems, and discussed how their complex interactions—in the formof network(s)—led <strong>to</strong> special concerns. We also provided a brief case study of the attack onMaroochy Water Services in 2000 which illustrates some of the difficulties in safeguarding anindustrial control system as well as the real-world consequences of a cyber attack against sucha system.SUGGESTED FURTHER READINGFor further reading, we highly recommend NIST Special Publication 800-82: “Guide <strong>to</strong>Industrial Control System Security” as it provides an in-depth discussion on ICS security thatis applicable in a variety of settings as well as strategies for minimizing ICS vulnerabilities.We also recommend the Proceedings of the National Academy of Science (PNAS) paper“Mitigation of malicious attacks on networks” (Vol. 108, No. 10, March 2011) which offersa great discussion on a novel mitigation strategy against fragmentation attacks on complexinteraction networks—with a focus on ICS systems.References1. Schwartz MJ. DHS, FBI Dispute Illinois Water Hack. InformationWeek. Available at: http: /www.informationweek.com/news/security/attacks/232200199; November 23, 2011 [accessed May 6, 2012].2. Sternstein A. Hackers manipulated railway computers, TSA memo says. NextGov. Available at: http: /www.nextgov.com/cybersecurity/2012/01/hackers-manipulated-railway-computers-tsa-memo-says/50498/; January23, 2012 [accessed May 6, 2012].3. Slay Jill, Miller Michael. Lessons learned from the Maroochy Water Breach. In: Goetz E, Shenoi S, edi<strong>to</strong>rs. CritInfrastruct Prot. New York, Heidelberg, Dordrecht, London: Springer; 2007.4. Obama B. Executive order—improving critical infrastructure cybersecurity. Office of the Press Secretary, The WhiteHouse. Available at: http: /www.whitehouse.gov/the-press-office/2013/02/12/executive-order-improving-criticalinfrastructure-cybersecurity;February 12, 2013.5. Office of the Press Secretary. Executive order on improving critical infrastructure cybersecurity. The WhiteHouse. Available at: http: /www.whitehouse.gov/the-press-office/2013/02/12/executive-order-improvingcritical-infrastructure-cybersecurity-0;February 12, 2013.6. Office of the Press Secretary. Fact sheet: presidential policy directive on critical infrastructure security and resilience.The White House. Available at: http: /www.whitehouse.gov/the-press-office/2013/02/12/fact-sheetpresidential-policy-directive-critical-infrastructure-securit;February 12, 2013.7. Andy G. President Obama’s cybersecurity executive order scores much better than CISPA on privacy. Forbes.Availableat: http: /www.forbes.com/sites/andygreenberg/2013/02/12/president-obamas-cybersecurity-executiveorder-scores-much-better-than-cispa-on-privacy/;February 12, 2013.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!