Archive of Operating Systems - MAVERICK Ideas

Conflict in the Workplace: What to do When Two Worlds Collide

Posted by Bruce Brandt on November 6, 2012 @ 11:25 am

  Recently I attended a session with a panel of security experts who were discussing process control system security. There were quite a number of surprising revelations from this gathering including the need to ensure that your facility’s control system isn’t found by a search engine called Shodan. It may sound like the villain of some cyberpunk novels, but can be a real threat to the security of your control system. I’d never heard of Shodan, so I was more than a bit taken aback that something like this existed and was regularly being used by hackers to attack industrial control systems. Hearing that the number of systems that can be found using this search engine numbers in the thousands was even more of a shock....

Continue ReadingLeave a Comment

VN:F [1.9.22_1171]
Tags: , , , , , , , , , , ,

Pardon me, your Slip is Showing!

Posted by Lori Hayes on May 2, 2012 @ 8:58 am

The corporate world we live in today relies on the information highway, an interconnected network system where business transactions are carried out in cyber space. Left undiscovered, a system’s vulnerability can lead to Intellectual Property (IP) loss, financial loss and confidential data exposure. In the Industrial Control System (ICS), hidden vulnerabilities can be exploited through malware, such as viruses and trojans, and can cause similar outcomes including unpredictable operations and expensive downtime, resulting in a loss of production and compromised safety systems. Can this really happen to you? Not so new to the cyber neighborhood are vulnerability researchers that look closely at ICS software and systems. The best outcome is that any vulnerability information is given directly to you or the Computer Emergency Readiness Team) (CERT), enabling a planne...

Continue ReadingLeave a Comment

VN:F [1.9.22_1171]
Tags: , , , , ,