Al-Khateeb: Rate of Foreign tourists coming for recreational purposes soars 600% in 5 years    Saudi Arabia participates in OIC anti-corruption agencies' meeting in Qatar    Saudi Arabia implements over 800 reforms to drive rapid transformation    Al-Jadaan: Painful decisions were part of the reforms, but economy overcame them    Al-Swaha: Saudi Arabia is heading towards exporting technology in the next phase    Israel-Hezbollah ceasefire appears to hold as Lebanese begin streaming back to their homes    Al Rajhi: Saudi Arabia sets revised unemployment target of 5% by 2030 "300,000 citizens employed in qualitative professions"    Imran Khan supporters call off protest after crackdown    Five survivors found day after Red Sea tourist boat sinking    Russia launched a record number of almost 200 drones toward Ukraine    Al Hilal advances to AFC Champions League knockout stage despite 1-1 draw with Al Sadd    Saudi Arabia unveils updates on Expo 2030 Riyadh master plan at 175th BIE General Assembly Riyadh Expo Development Company established to oversee strategic planning, operations, and legacy development    Saudi FM attends Quadripartite meeting on Sudan in Italy    Best-selling novelist Barbara Taylor Bradford dies    Cristiano Ronaldo's double powers Al Nassr to 3-1 win over Al Gharafa in AFC Champions League    Al Ahli edges Al Ain 2-1, bolsters perfect start in AFC Champions League Elite    Most decorated Australian Olympian McKeon retires    Adele doesn't know when she'll perform again after tearful Vegas goodbye    'Pregnant' for 15 months: Inside the 'miracle' pregnancy scam    Do cigarettes belong in a museum?    Order vs. Morality: Lessons from New York's 1977 Blackout    India puts blockbuster Pakistani film on hold    The Vikings and the Islamic world    Filipino pilgrim's incredible evolution from an enemy of Islam to its staunch advocate    Exotic Taif Roses Simulation Performed at Taif Rose Festival    Asian shares mixed Tuesday    Weather Forecast for Tuesday    Saudi Tourism Authority Participates in Arabian Travel Market Exhibition in Dubai    Minister of Industry Announces 50 Investment Opportunities Worth over SAR 96 Billion in Machinery, Equipment Sector    HRH Crown Prince Offers Condolences to Crown Prince of Kuwait on Death of Sheikh Fawaz Salman Abdullah Al-Ali Al-Malek Al-Sabah    HRH Crown Prince Congratulates Santiago Peña on Winning Presidential Election in Paraguay    SDAIA Launches 1st Phase of 'Elevate Program' to Train 1,000 Women on Data, AI    41 Saudi Citizens and 171 Others from Brotherly and Friendly Countries Arrive in Saudi Arabia from Sudan    Saudi Arabia Hosts 1st Meeting of Arab Authorities Controlling Medicines    General Directorate of Narcotics Control Foils Attempt to Smuggle over 5 Million Amphetamine Pills    NAVI Javelins Crowned as Champions of Women's Counter-Strike: Global Offensive (CS:GO) Competitions    Saudi Karate Team Wins Four Medals in World Youth League Championship    Third Edition of FIFA Forward Program Kicks off in Riyadh    Evacuated from Sudan, 187 Nationals from Several Countries Arrive in Jeddah    SPA Documents Thajjud Prayer at Prophet's Mosque in Madinah    SFDA Recommends to Test Blood Sugar at Home Two or Three Hours after Meals    SFDA Offers Various Recommendations for Safe Food Frying    SFDA Provides Five Tips for Using Home Blood Pressure Monitor    SFDA: Instant Soup Contains Large Amounts of Salt    Mawani: New shipping service to connect Jubail Commercial Port to 11 global ports    Custodian of the Two Holy Mosques Delivers Speech to Pilgrims, Citizens, Residents and Muslims around the World    Sheikh Al-Issa in Arafah's Sermon: Allaah Blessed You by Making It Easy for You to Carry out This Obligation. Thus, Ensure Following the Guidance of Your Prophet    Custodian of the Two Holy Mosques addresses citizens and all Muslims on the occasion of the Holy month of Ramadan    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



Industrial enterprises at risk from cyber attacks: FireEye report
Published in The Saudi Gazette on 29 - 04 - 2017

[caption id="attachment_141650" align="alignleft" width="300"] Stuart Davis[/caption]
FIREEYE, the intelligence-led security company, recently announced the release of its ‘Subversive Six' report, which is the result of a focused analysis of the industrial sector by experts at FireEye iSIGHT Intelligence.
Industrial enterprises including electric utilities, petroleum companies, and manufacturing organizations invest heavily in industrial control systems (ICS) to efficiently, reliably, and safely operate industrial processes. The FireEye report identifies the six areas of vulnerability in a typical industrial scenario:
Unauthenticated protocols — Many ICS protocols operate without authentication — the ability to ensure that data comes from a trusted source. Effectively, any computer on the network can send commands that alter the physical process, leading to incorrect process operation that can damage goods, destroy equipment, harm personnel, or degrade the environment. Source authentication is normally achieved by verification and use of cryptographic keys.
Outdated hardware — ICS hardware can be operational for decades, and may operate too simplistically or lack the processing power and memory to handle the threats presented by modern network technology.
Weak user authentication — ICS users commonly authenticate with passwords, and weaknesses in legacy control systems often include hard-coded passwords, easily cracked passwords, passwords stored in easily recoverable formats, and passwords sent in clear text. An attacker who obtains these passwords can often interact with the controlled process at will.
Weak integrity checks — Integrity checking, the ability to verify the integrity and origin of data or code, is normally achieved by cryptographic verification, and weaknesses include weak software signing, weak firmware integrity checks, and weak control logic integrity checks.
Vulnerabilities affecting Windows operating systems — Engineering workstations and Human-Machine Interfaces (HMI) often run outdated and unpatched Microsoft Windows operating systems, leaving them exposed to vulnerabilities. In some cases, this means that adversaries may access industrial systems without needing specific knowledge of the control systems.
Undocumented third-party relationships — ICS asset owners seldom document and track third-party dependencies in ICS software they operate, and many ICS vendors may not immediately know the third-party components they use, making it difficult for them to inform their customers of the vulnerabilities. Adversaries aware of these dependencies can target software the industrial firm may not even know it has.
"With the increased demand to have operational technology (OT) networks connected to internet enabled networks for Real Time Telemetry (RTT), we are seeing a corresponding increase in opportunities for adversaries with malicious intent to undermine organizations in the industrial sector that are less security-conscious. It is becoming even more important that organizations employ the right resources to identify and plug their security gaps to prevent future threats," said Stuart Davis, director, Middle East, Mandiant (A FireEye Company).
"In 2017, we expect the number of politically and financially motivated attacks to increase. At FireEye, our aim is to continuously assess and provide industry insights that can inspire a higher focus on security across industry verticals," he added.
FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant consulting.
With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber-attacks. FireEye has over 5,600 customers across 67 countries, including more than 40 percent of the Forbes Global 2000.
FireEye, Mandiant and M-Trends are registered trademarks or trademarks of FireEye, Inc. in the United States and other countries. All other brands, products or service names are or may be trademarks or service marks of their respective owners.


Clic here to read the story from its source.