首页> 外文期刊>International Journal of Cyber Warfare and Terrorism >A White Hat Study of a Nation's Publicly Accessible Critical Digital Infrastructure and a Way Forward
【24h】

A White Hat Study of a Nation's Publicly Accessible Critical Digital Infrastructure and a Way Forward

机译:对国家公共可访问的关键数字基础设施的白帽研究和前进的道路

获取原文
获取原文并翻译 | 示例
       

摘要

The developed society depends on many critical infrastructure processes, such as power generation, water treatment, many types of manufacturing, and smart buildings. These processes need control and the automation industry has embraced the Internet to connect all these controls. However, the controlling devices thus opened to the world do not always have adequate safeguards to withstand malicious users. Many automation systems have default passwords or known and unknown backdoors. Also, often those systems are not updated to close security weaknesses found after original installation. The authors argue that while the industry is familiar with the notion of safety of equipment and processes, it has not focused enough on IT security. Several years ago the Shodan search engine showed how easy it is to find these control devices on the Internet. The authors followed this research line further by targeting one nation's IP address space with Shodan and found thousands of control systems, many of which represent models and versions with known vulnerabilities. Their first contribution is presenting these findings and analyzing their significance. Their study started in 2012 and the most recent results are from the end of 2015. To gain further knowledge, they have built a prototype scanner capable of finding industrial control systems. This lets the authors evaluate the possibility of performing routine scans to gauge the vulnerability of a nation. Their second contribution is to present a template for a national Internet scanning program. The authors discuss the technology, performance, and legality of such a program. Based on their findings and analysis they argue that nations should continuously monitor their own Internet address space for vulnerabilities. The authors' findings indicate that the current level of vulnerabilities is significant and unacceptable. Scanning a nation's critical infrastructure can be done in minutes, allowing them to keep a tight control of vulnerabilities. Yet, in addition, the authors need to extend current legislation and the rights of government officials to bring more security in national critical infrastructures; this discussion is their third contribution. The cyber-space has become a playing field for criminals, terrorists and nation states, all of which may have a motive to disrupt the daily life of a nation, and currently causing such disruptions is too easy.
机译:发达社会依赖于许多关键的基础设施流程,例如发电,水处理,许多类型的制造业和智能建筑。这些过程需要控制,自动化行业已经拥抱了Internet以连接所有这些控制。然而,向世界开放的控制设备并不总是具有足够的安全措施来抵御恶意用户。许多自动化系统具有默认密码或已知和未知的后门。另外,通常不会对那些系统进行更新以消除在原始安装后发现的安全漏洞。作者认为,尽管该行业熟悉设备和流程的安全性概念,但对IT安全性的关注还不够。几年前,Shodan搜索引擎表明,在Internet上找到这些控制设备非常容易。作者通过Shodan瞄准了一个国家的IP地址空间,从而进一步遵循了这一研究路线,并发现了成千上万个控制系统,其中许多控制系统代表着具有已知漏洞的模型和版本。他们的首要贡献是提出这些发现并分析其意义。他们的研究始于2012年,最新结果是2015年底。为了获得更多知识,他们构建了能够找到工业控制系统的原型扫描仪。这使作者可以评估执行例行扫描以评估一个国家的脆弱性的可能性。他们的第二个贡献是为国家互联网扫描程序提供了模板。作者讨论了这种程序的技术,性能和合法性。根据他们的发现和分析,他们认为国家应该持续监控自己的Internet地址空间中的漏洞。作者的发现表明,当前的漏洞级别是重大且不可接受的。扫描国家的关键基础架构可以在几分钟内完成,从而使他们可以严格控制漏洞。然而,此外,作者还需要扩展现行立法和政府官员的权利,以在国家关键基础架构中提高安全性;这次讨论是他们的第三项贡献。网络空间已经成为罪犯,恐怖分子和民族国家的运动场,所有这些都可能有动机破坏一个国家的日常生活,而目前造成这种破坏的过程太容易了。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号