4 February 2014 by James Hayes
data available from mainstream online media - such as blogs, social networking websites, and specialist online publications - could be used by malevolent agents to mount a cyber-attack on UK critical national infrastructure.
Key information regarding vulnerabilities in Industrial Control Systems (ICSs) and Supervisory Control and Data Acquisition (SCADA) systems is now openly available from a range of sources on the public Internet. The investigation discovered that many industrial sector websites and academic papers, for example, also provide some information about potential attack vectors, including the identification of engineering staff, their social media information used to corroborate control systems data, and their suitability for social engineering attempts.
The identification of known vulnerabilities and exploits against specific types of control systems can also be accessed online, along with the identification of third-parties such as contractors and control system integrators, who have detailed knowledge and physical network access.
There's still time to register for Cyber Security for Industrial Control Systems which takes takes place at the Holiday Inn Bloomsbury (London WC1N 1HT - close to Euston and King's Cross mainline stations) this Thursday, 6th February 2014. There's also an option for delegates to expand their knowledge by attending a half-day workshop held the day before, Wednesday 5th February. Delegates can choose to attend the seminar only, but those who want a deeper understanding of risk assessment techniques can register to attend the workshop for an additional fee. Further information and registration details at: http://conferences.theiet.org/cyber-ics
Edited: 04 February 2014 at 02:28 PM by James Hayes
Posted By: James Hayes @ 04 February 2014 09:16 AM Cyber Security
FuseTalk Standard Edition - © 1999-2014 FuseTalk Inc. All rights reserved.
"What the Scottish independence referenda could mean for engineers and engineering on both sides of the border"
- Poor coding puts business applications at risk of hacking
- Professor Stephen Hawking backs ice bucket challenge
- Jaguar E-Type voted greatest car of all time by motorists
- Sheepdog study could lead to herding robots
- Understanding the Implications of Tor’s latest hack
- World committing to decades of CO2 by building more plants
- What to Specialise in Electronics Engineering?? [03:02 am 03/04/14]
- Britain to have just one remaining coal pit by the end of 2015 [01:11 am 03/04/14]
- LV Generator Star point earthing - UK [08:35 pm 02/04/14]
- East West Rail - the Oxford to Bedford route [07:33 pm 02/04/14]
- Small nuclear power [06:06 pm 02/04/14]
Tune into our latest podcast