Are you under cyber attack?

Lowe, Justin; Hayes, Rob
October 2006
ICIS Chemical Business;10/30/2006, Vol. 1 Issue 41, p20
Trade Publication
The article reports on a study that most control systems are vulnerable to attack by hackers through the corporate network. While some companies have installed a firewall between the control system and the corporate network, there are numerous reported incidents where hackers and worms have got through or around this protection to the vulnerable control system inside. There are however no effective industry standards for control system security in the chemical sector.


Related Articles

  • FIREWALLS AS A MEANS TO PROVIDE INTERNET SECURITY. Tejasvit, Kour // International Journal of Engineering & Management Sciences;2013, Vol. 4 Issue 3, p405 

    With the grand scale use of the internet arises the need of its security. Every now and then various threats and viruses are created to disrupt the system. Hacking poses another serious threat to internet as it may lead to mishandling of highly confidential and important data concerning with...

  • You've Got Mail. Beech, Hannah // Time International (Atlantic Edition);10/24/2011, Vol. 178 Issue 16, p54 

    An essay about government surveillance of people's online activities in China. It notes security technology company McAfee's allegations that the Chinese government hacked into 70 large computer networks, a plot called Operation Shady RAT. The author describes how she is blocked from social...

  • Limiting your security to a firewall could be akin to opening Pandora's box. Vizard, Michael // InfoWorld;04/09/2001, Vol. 23 Issue 15, p69 

    Argues that the installation of firewalls does not ensure the safety of computer networks from hackers. Need for computer users to install several computer security devices; Importance of securing Web applications.

  • Beyond the network firewall. West, David // Control Engineering;Sep2012, Vol. 59 Issue 9, pP9 

    The article discusses the need to protect industrial devices from hackers. It suggests putting firewalls into networks near programmable logic controllers or embedding them in similar controllers to provide protection for individual device. It also discusses strategies for enforcing firewall...

  • EFFECTS OF ORDERED ACCESS LISTS IN FIREWALLS. Bukhatwa, Faheem; Patel, Ahmed // Proceedings of the IADIS International Conference on WWW/Interne;Jan2003, p257 

    Firewalls are hardware and software systems that protect a network from attacks coming from the Internet. Packet filtering firewalls are efficient, fast and provide a good level of security and have withstood the test of time. Firewalls based on packet filtering provide protection through...

  • Adding features brings unpredictable performance.  // NetworkWorld Asia;Jan/Feb2008, Vol. 4 Issue 1, p37 

    The article discusses the effect of adding unified threat-management (UTM) features in computer networks of companies in the U.S. It is stated that adding UTM features like intrusion-prevention systems (IPS) and antivirus scanning brings unpredictable impact on total system performance. In...

  • What happens in plant stays in plant. Permann, May; Hammer, John; Rohde, Ken; Lee, Kathy // InTech;Mar2007, Vol. 54 Issue 3, p14 

    The article explains the necessary steps required to secure a company's internal control systems. These systems are separated from the business local area network of the company using network isolation technologies such as firewalls. The first step in securing control system networks are sound...

  • Security vendor: Firewalls defenseless against new attack. Dunn, John E. // ComputerWorld Hong Kong;Nov2010, Vol. 27 Issue 9, p43 

    The article discusses the Advanced Evasion Techniques (AET) which means an obscure class of packed-based searching at the ground level of the Transmission Control Protocol/Internet Protocol (TCP/IP) stack that firewalls are able to stop. Finnish security vendor Stonesoft explains why well-defend...

  • Intrusion Detection Systems. Guiguo Liu // Applied Mechanics & Materials;2014, Issue 596, p852 

    In the ear of information society, network security have become a very important issues. Intrusion is a behavior that tries to destroy confidentiality, data integrality, and data availability of network information. Intrusion detection systems are constructed as a software that automates the...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics