Explore chapters and articles related to this topic
Engineered to Be Secure
Published in Larry B. Rainey, Mo Jamshidi, Engineering Emergence, 2018
Utilities build and support information technology, operational, communications, and cyber-physical systems (CPS) that support delivery of electricity, water, and gas to the general public, businesses, and the U.S. government. Combined, these systems support the modern way of life enjoyed by people across the United States and in other countries. These systems also comprise the lifeline sectors within the national critical infrastructure. Furthermore, the development of smart networking necessitates these systems to evolve and proliferate since modern communications and networks are required for the smart capabilities of such networks. As software takes over more and more controlling functions in all of these smart networked environments, the potential impact of security vulnerabilities and subsequent attacks, such as Stuxnet and Havex, demonstrate a growing need to improve capabilities to address cybersecurity risk (Wald 2013, Kovacs 2014).
Industrial control system security
Published in Raymond F. Gardner, Introduction to Plant Automation and Controls, 2020
A few examples of malware known to specifically target Industrial Control Systems are: Stutnex, Havex, BlackEnergy, TRITON/TRISS, Industroyer, and others. Industroyer, for example, left one-fifth of the Ukrainian city of Kiev without electrical power for an hour, and that hack was conjectured to just be a large-scale test of the malware. The concerns go beyond simple inconvenience and are issues that affect life-safety or national security, where such outages can cause military vulnerability or long-term large-scale disruption of critical infrastructures.
Security of networked control systems subject to deception attacks: a survey
Published in International Journal of Systems Science, 2022
Zhong-Hua Pang, Lan-Zhi Fan, Haibin Guo, Yuntao Shi, Runqi Chai, Jian Sun, Guo-Ping Liu
On the other hand, the presence of communication networks in NCSs also brings several new challenges. One of them is that malicious adversaries can utilise public and vulnerable natures of networks to launch cyber attacks to achieve their destructive intentions on NCSs (D. Ding et al., 2021; D. Ding & Han et al., 2018; W. He et al., 2022; Y.-G. Li & Yang, 2022; X. Wang et al., 2022; Y. Xu et al., 2021; X.-M. Zhang et al., 2022). The earliest cyber attack event occurred in 1982, which led to the explosion of a Siberia pipeline (Onyeji et al., 2014). In recent years, cyber attack incidents on NCSs frequently appeared around the world. Several typical cases are listed as follows. In 2010, Stuxnet severely damaged Iran's nuclear facilities and ultimately delayed the operation of the Bushehr nuclear plant in Iran, which was seen as the first destructive virus designed specifically for industrial control systems (T. M. Chen & Abu-Nimeh, 2011).In 2011, five global energy and oil companies suffered from a series of attacks including social engineering, trojans and Windows-based exploits (Cherdantseva et al., 2016).In 2012, Flame attacked the industrial systems in Iran, Israel, Sudan, Syria, Lebanon and other countries in the Middle East and North Africa (Miller &Rowe, 2012).In 2013, Havex emerged to spy on critical infrastructures primarily in Europe and the United States, which was a backdoor malware and affected critical infrastructures by compromising communication protocols (Makrakis et al., 2021).In 2015, a power grid in Ukraine was attacked by a Black Energy virus that caused power outages lasting for several hours. After nearly one year, the power grid in Kiev was intruded again in 2016, which resulted in about 225,000 customers without electric power (Hemsley & Fisher, 2018).In 2017, WannaCry was a ransomware that encrypted the storage files in attacked computers and demanded ransom from victims, which hit many companies, universities, hospitals and governments with over 200,000 victims (Mohurle &Patil, 2017).In 2019, the hydroelectric power plant in Venezuela, Guri was hacked by a cyber attack that disrupted the power supply of 18 states including the capital, Caracas, causing massive traffic congestion (Cao et al., 2021).In 2020, the MailTo ransomware attacked Australian Shipping and Logistics Company Toll Group for three consecutive months, which forced it to provide many of its customer services off-line (Chowdhury et al., 2022).