Suspect charged after Vancouver car ramming leaves 11 dead    Suspect in killing of general claims he was paid by Ukraine    North Korea confirms troop deployment to Russia for first time    Rock & Roll Hall of Fame picks Outkast but not Oasis    400-800 year old giant coral colony discovered within AMAALA waters in the Red Sea    Makkah police arrest Yemeni and Egyptian suspects of fake Hajj campaign    Kafalah grants 1,900 loan guarantees worth over SR4.8 billion to SMEs during 1Q 2025    Council of Senior Scholars reaffirms performing Hajj without a permit is a sinful act    HR Ministry launches 'Ajeer Al-Hajj' service for seasonal work during Hajj 2025    stc reports strong first-quarter 2025 results with 11% rise in net profit    King and Crown Prince offer condolence to Iranian president over the deadly port explosion    Saudi Awwal Bank records SR2.1 billion net profit after zakat and income tax for 1Q25    Virgin Atlantic celebrates one month of nonstop service between London and Riyadh    Al Ahli cruise past Buriram into AFC Champions League Elite semi-finals    Duran leads Al Nassr past Yokohama Marinos into AFC Champions League Elite semi-finals    Saudi orchestra to perform at Sydney Opera House in May    Al Hilal thrash Gwangju to reach AFC Champions League Elite semi-finals    Saudi Theater Commission launches its Work and Learn Project in UK    The season has begun — and one comment shook us all    Average life expectancy in Saudi Arabia rises to78.8 years    Pakistani star's Bollywood return excites fans and riles far right    Veteran Bollywood actor Manoj Kumar dies at 87    Bollywood actress vindicated over boyfriend's death after media hounding    Grand Mufti rules against posting prayers and preaching in mosques on social media    Exotic Taif Roses Simulation Performed at Taif Rose Festival    Asian shares mixed Tuesday    Weather Forecast for Tuesday    Saudi Tourism Authority Participates in Arabian Travel Market Exhibition in Dubai    Minister of Industry Announces 50 Investment Opportunities Worth over SAR 96 Billion in Machinery, Equipment Sector    HRH Crown Prince Offers Condolences to Crown Prince of Kuwait on Death of Sheikh Fawaz Salman Abdullah Al-Ali Al-Malek Al-Sabah    HRH Crown Prince Congratulates Santiago Peña on Winning Presidential Election in Paraguay    SDAIA Launches 1st Phase of 'Elevate Program' to Train 1,000 Women on Data, AI    41 Saudi Citizens and 171 Others from Brotherly and Friendly Countries Arrive in Saudi Arabia from Sudan    Saudi Arabia Hosts 1st Meeting of Arab Authorities Controlling Medicines    General Directorate of Narcotics Control Foils Attempt to Smuggle over 5 Million Amphetamine Pills    NAVI Javelins Crowned as Champions of Women's Counter-Strike: Global Offensive (CS:GO) Competitions    Saudi Karate Team Wins Four Medals in World Youth League Championship    Third Edition of FIFA Forward Program Kicks off in Riyadh    Evacuated from Sudan, 187 Nationals from Several Countries Arrive in Jeddah    SPA Documents Thajjud Prayer at Prophet's Mosque in Madinah    SFDA Recommends to Test Blood Sugar at Home Two or Three Hours after Meals    SFDA Offers Various Recommendations for Safe Food Frying    SFDA Provides Five Tips for Using Home Blood Pressure Monitor    SFDA: Instant Soup Contains Large Amounts of Salt    Mawani: New shipping service to connect Jubail Commercial Port to 11 global ports    Custodian of the Two Holy Mosques Delivers Speech to Pilgrims, Citizens, Residents and Muslims around the World    Sheikh Al-Issa in Arafah's Sermon: Allaah Blessed You by Making It Easy for You to Carry out This Obligation. Thus, Ensure Following the Guidance of Your Prophet    Custodian of the Two Holy Mosques addresses citizens and all Muslims on the occasion of the Holy month of Ramadan    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



Industrial enterprises at risk from cyber attacks: FireEye report
Published in The Saudi Gazette on 29 - 04 - 2017

[caption id="attachment_141650" align="alignleft" width="300"] Stuart Davis[/caption]
FIREEYE, the intelligence-led security company, recently announced the release of its ‘Subversive Six' report, which is the result of a focused analysis of the industrial sector by experts at FireEye iSIGHT Intelligence.
Industrial enterprises including electric utilities, petroleum companies, and manufacturing organizations invest heavily in industrial control systems (ICS) to efficiently, reliably, and safely operate industrial processes. The FireEye report identifies the six areas of vulnerability in a typical industrial scenario:
Unauthenticated protocols — Many ICS protocols operate without authentication — the ability to ensure that data comes from a trusted source. Effectively, any computer on the network can send commands that alter the physical process, leading to incorrect process operation that can damage goods, destroy equipment, harm personnel, or degrade the environment. Source authentication is normally achieved by verification and use of cryptographic keys.
Outdated hardware — ICS hardware can be operational for decades, and may operate too simplistically or lack the processing power and memory to handle the threats presented by modern network technology.
Weak user authentication — ICS users commonly authenticate with passwords, and weaknesses in legacy control systems often include hard-coded passwords, easily cracked passwords, passwords stored in easily recoverable formats, and passwords sent in clear text. An attacker who obtains these passwords can often interact with the controlled process at will.
Weak integrity checks — Integrity checking, the ability to verify the integrity and origin of data or code, is normally achieved by cryptographic verification, and weaknesses include weak software signing, weak firmware integrity checks, and weak control logic integrity checks.
Vulnerabilities affecting Windows operating systems — Engineering workstations and Human-Machine Interfaces (HMI) often run outdated and unpatched Microsoft Windows operating systems, leaving them exposed to vulnerabilities. In some cases, this means that adversaries may access industrial systems without needing specific knowledge of the control systems.
Undocumented third-party relationships — ICS asset owners seldom document and track third-party dependencies in ICS software they operate, and many ICS vendors may not immediately know the third-party components they use, making it difficult for them to inform their customers of the vulnerabilities. Adversaries aware of these dependencies can target software the industrial firm may not even know it has.
"With the increased demand to have operational technology (OT) networks connected to internet enabled networks for Real Time Telemetry (RTT), we are seeing a corresponding increase in opportunities for adversaries with malicious intent to undermine organizations in the industrial sector that are less security-conscious. It is becoming even more important that organizations employ the right resources to identify and plug their security gaps to prevent future threats," said Stuart Davis, director, Middle East, Mandiant (A FireEye Company).
"In 2017, we expect the number of politically and financially motivated attacks to increase. At FireEye, our aim is to continuously assess and provide industry insights that can inspire a higher focus on security across industry verticals," he added.
FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant consulting.
With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber-attacks. FireEye has over 5,600 customers across 67 countries, including more than 40 percent of the Forbes Global 2000.
FireEye, Mandiant and M-Trends are registered trademarks or trademarks of FireEye, Inc. in the United States and other countries. All other brands, products or service names are or may be trademarks or service marks of their respective owners.


Clic here to read the story from its source.