A White Hat Study of a Nation's Publicly Accessible Critical Digital Infrastructure and a Way Forward
The developed society depends on many critical infrastructure processes, such as power generation, water treatment, many types of manufacturing, and smart buildings. These processes need control and the automation industry has embraced the Internet to connect all these controls. However, the controlling devices thus opened to the world do not always have adequate safeguards to withstand malicious users. Many automation systems have default passwords or known and unknown backdoors. Also, often those systems are not updated to close security weaknesses found after original installation. The authors argue that while the industry is familiar with the notion of safety of equipment and processes, it has not focused enough on IT security. Several years ago the Shodan search engine showed how easy it is to find these control devices on the Internet. The authors followed this research line further by targeting one nation's IP address space with Shodan and found thousands of control systems, many of which represent models and versions with known vulnerabilities. Their first contribution is presenting these findings and analyzing their significance. Their study started in 2012 and the most recent results are from the end of 2015. To gain further knowledge, they have built a prototype scanner capable of finding industrial control systems. This lets the authors evaluate the possibility of performing routine scans to gauge the vulnerability of a nation. Their second contribution is to present a template for a national Internet scanning program. The authors discuss the technology, performance, and legality of such a program. Based on their findings and analysis they argue that nations should continuously monitor their own Internet address space for vulnerabilities. The authors' findings indicate that the current level of vulnerabilities is significant and unacceptable. Scanning a nation's critical infrastructure can be done in minutes, allowing them to keep a tight control of vulnerabilities. Yet, in addition, the authors need to extend current legislation and the rights of government officials to bring more security in national critical infrastructures; this discussion is their third contribution. The cyber-space has become a playing field for criminals, terrorists and nation states, all of which may have a motive to disrupt the daily life of a nation, and currently causing such disruptions is too easy.
Year of publication: |
2016
|
---|---|
Authors: | Kiravuo, Timo ; Tiilikainen, Seppo ; Särelä, Mikko ; Manner, Jukka |
Published in: |
International Journal of Cyber Warfare and Terrorism (IJCWT). - IGI Global, ISSN 1947-3443, ZDB-ID 2703180-9. - Vol. 6.2016, 1 (01.01.), p. 41-52
|
Publisher: |
IGI Global |
Subject: | Critical Infrastructure | Cyber Security | ICS | Industrial Automation | Networked Automation Systems | SCADA Security | Search Engine | Shodan |
Saved in:
Online Resource
Saved in favorites
Similar items by subject
-
Safeguarding critical transportation infrastructure: The US case
Szyliowicz, Joseph S., (2013)
-
IT and more : EU verschärft Vorgaben zur Cybersecurity : warum deutsche Unternehmen reagieren müssen
Meister, Laurent, (2024)
-
CASE | KRITIS : Fallstudien zur IT-Sicherheit in kritischen Infrastrukturen
Lechner, Ulrike, (2018)
- More ...