How hackers exploit critical infrastructure

  • 19 July 2018
  • 0 replies
  • 192 views

Userlevel 7
Badge +54
19th July, 2018 By Edward Amoroso
 
The traditional focus of most hackers has been on software, but the historical focus of crime is on anything of value. It should come as no surprise, therefore, that as operational technology (OT) and industrial control system (ICS) infrastructure have become much more prominent components of national critical infrastructure, that malicious hacking activity would be increasingly targeted in this direction.
 
It also stands to reason that the salient aspects of hacking – namely, remote access, automated tools, and weak attribution – would extend naturally to malicious targeting of critical OT/ICS infrastructure. These attributes are particularly attractive in this context, because criminals interested in disrupting factories, production systems, and other tangible infrastructure, previously had to establish physical presence or compromise some group with local access.
 
 
 


 
IT/OT substation protection using advanced separation technology

  
Full Article.

0 replies

Be the first to reply!

Reply