Cyber Affairs
No Result
View All Result
  • Login
  • Register
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers
Home ICS-SCADA

Federally Operated SCADA Systems Work to Block Cyberattacks

admin by admin
Dec 23, 2022
in ICS-SCADA
0 0
A A
0
FacebookTwitterLinkedIn

SCADA Management Requires A Range of Efforts

The need to address potential gaps in SCADA become apparent when one considers the breadth of critical infrastructure managed or operated by government organizations and entities.

The Bureau of Reclamation is the largest wholesaler of water in the nation. The Army Corps of Engineers’ nationwide network of dams is the country’s largest generator of hydropower. Dozens of DOD bases rely on SCADA control systems.

“Industrial control systems are essential” to managing all that critical infrastructure, says Ahmad Zoua, senior project manager at Guidepost Solutions. “Unfortunately, many of them focus on functions, convenience and increased productivity, while cybersecurity is an afterthought.”

Current events have brought the issue to the fore. CISA has developed a new “Shields Up” campaign, which warns that Russia’s invasion of Ukraine could spur “malicious cyber activity against the U.S. homeland,” including efforts to disrupt critical infrastructure.

Even before Ukraine, however, agencies were taking steps to close the gap. The Army Corps of Engineers recently upgraded controllers and modules at The Dalles Dam in Oregon, one of the largest hydropower generators in the country. The Bureau of Reclamation likewise has undertaken an update of its SCADA systems in an effort to standardize the system and collect data and alerts more quickly.

EXPLORE: How federal agencies can benefit from the technology modernization fund.

The Role of Military Power in SCADA

Meanwhile, the Army has moved aggressively on the SCADA situation. Industrial controls are a key mission enabler across the Army.

“We have a lot of control systems — in our weapon system platforms, in installations — running our most complex manufacturing processes,” Iyer says.

“These are all devices that are connected to the network in some way; they communicate with other devices or back to a server. That means they are susceptible to cyberattacks,” he says.

The May 2021 attack on a major U.S. fuel pipeline and other similar incidents highlight the urgency of addressing that potential susceptibility. “I think it’s very clear just from recent incidents that have happened outside of the Army that the homeland is no longer a sanctuary. Our adversaries and cyber criminals have in the past attempted to penetrate power grids, pipelines, and so forth,” Iyer says.

Federal mandates, too, are driving a rethink. “This year, in the National Defense Authorization Act, there were at least a dozen or so requirements around protecting critical infrastructure,” Iyer notes.

LEARN MORE: How the navy is improving collaboration and productivity.

How best to bring SCADA up to speed? “It starts with identifying all of the control system assets on our network, from tiny sensors all the way to huge complex systems. Identifying them, cataloging them and discovering them is the first step,” he says.

“We have an effort under way where we’re actually putting sensors across our network to identify these assets, classify them, tag them, and understand their current security posture,” he says.

From there, the Army is moving to isolate these control systems from the rest of the network. “We could set up virtual networks, use things like software defined networking to isolate these things. Then we can put these devices on a separate network that’s closed, isolated,” Iyer says. “They could be put behind a firewall so that they cannot be accessed from outside. That is all part of the architecting that we’re doing right now.”

As with other government agencies, the Army also wants to engage with private-sector partners who have a hand in managing critical infrastructure. “These are not all government-operated installations, so we are working with industry or the contractors are that run our bases, in order to do that,” Iyer says.

Read the full article here

ShareTweetSharePinShareShareSend

Related Articles

2023 ICS Patch Tuesday Debuts With 12 Security Advisories From Siemens, Schneider
ICS-SCADA

Industry Reactions to ‘OT:Icefall’ Vulnerabilities Found in ICS Products

2023 ICS Patch Tuesday Debuts With 12 Security Advisories From Siemens, Schneider
ICS-SCADA

Uber Settles With Federal Investigators Over 2016 Data Breach Coverup

2023 ICS Patch Tuesday Debuts With 12 Security Advisories From Siemens, Schneider
ICS-SCADA

Thousands of VNC Instances Exposed to Internet as Attacks Increase

Yucatan is at the forefront in Cybersecurity – The Yucatan Times
ICS-SCADA

Yucatan is at the forefront in Cybersecurity – The Yucatan Times

2023 ICS Patch Tuesday Debuts With 12 Security Advisories From Siemens, Schneider
ICS-SCADA

Ransomware Group Claims Access to SCADA in Confusing UK Water Company Hack

Why OT Environments Are Getting Attacked And What Organizations Can Do About It
ICS-SCADA

Why OT Environments Are Getting Attacked And What Organizations Can Do About It

Hacktivist Attacks Show Ease of Hacking Industrial Control Systems
ICS-SCADA

ICS Patch Tuesday: Siemens, Schneider Electric Fix High-Severity Vulnerabilities

Microsoft confirms Exchange zero-day flaws actively exploited in the wildSecurity Affairs
ICS-SCADA

Microsoft confirms Exchange zero-day flaws actively exploited in the wildSecurity Affairs

Lazarus employed an exploit in a Dell firmware driver in recent attacksSecurity Affairs
ICS-SCADA

Lazarus employed an exploit in a Dell firmware driver in recent attacksSecurity Affairs

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended Stories

Understanding the Implications & Guarding Privacy- Axios Security Group

Understanding the Implications & Guarding Privacy- Axios Security Group

Hackers Actively Using Pupy RAT to Attack Linux Systems

Hackers Actively Using Pupy RAT to Attack Linux Systems

Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Chinese Chipmaker Nexperia: Gigabytes of Data Stolen

Chinese Chipmaker Nexperia: Gigabytes of Data Stolen

Popular VPN Software Flaw Let Attackers Crash the Systems

Popular VPN Software Flaw Let Attackers Crash the Systems

The most important cyber news and events of the day

Be the first to know latest important news & events directly to your inbox.

By signing up, I agree to our TOS and Privacy Policy.

Popular Stories

  • Fortinet Vulnerability Exploited To Deploy RMM Tools & Backdoor

    Fortinet Vulnerability Exploited To Deploy RMM Tools & Backdoor

    0 shares
    Share 0 Tweet 0
  • Malware Trends 2024 – Top Malware Families and Types

    0 shares
    Share 0 Tweet 0
  • French Football Club Ticketing System Targeted in Cyber Attack

    0 shares
    Share 0 Tweet 0
  • Singha Durbar server continues to face cyberattacks

    0 shares
    Share 0 Tweet 0
  • Argentina – Global Investigations Review

    0 shares
    Share 0 Tweet 0
Cyber Affairs

Cyber Affairs is your one-stop news website for the latest cyber crime, cyber warfare, and all cyber related news and updates, follow us to get the news that matters to you.

LEARN MORE »

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

The most important cyber news and events of the day

Be the first to know latest important news & events directly to your inbox.

By signing up, I agree to our TOS and Privacy Policy.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.