Energy Under Hacktivist Threat

 

In a conference recently held in the state of Wyoming, US, an FBI official of the criminal and national cyber security squad said that in light of the number of cyber attacks which has occurred lately, the state, and especially the energy companies in its territory, must take seriously the possible dangers for facilities supplying energy to residents. 

According to him, any company or business that use computers are exposed to cyber threats, but the energy companies even more so, as they are part of the state’s infrastructure which means they are in more dangers than anyone else. He specified and said that potential attackers, which pose the most number of hack threat are the ones inside the system, such as disgruntled employees with access to company computers.

A second source for cyber attacks are a group of hackers called Hacktivists, a combination of the words Hacker and Activists, whose goal is to steal information and cause damage in order to bring what they would consider to be a political or social achievement. The FBI official said in his review, during the conference which dealt with the issue of energy and was arranged by the Wyoming Infrastructure Authority, that Hacktivism hold serious dangers since hacktivists can’t be characterized by any single or special personality patterns – the group contains activists from any political and social affiliation – and so it’s next to impossible to recognize them in advance.
One of the worst dangers for the energy field by cyber activists is stealing professional information which is defined as “intellectual property” such as a proprietary way to drill a well, but an even more substantial danger, one which the law enforcement authorities are losing sleep over, is a cyber attack meant to disrupt the factory’s manufacturing process, thus causing damage in the real world.

One pattern of action used to penetrate the computer network is by sending a software to an employee who unknowingly activates it and with it allows the penetration of hostile factors. After penetrating, they stay in the system and integrate into the company’s routine so they’re hard to detect as standing out. The spokesperson concluded and emphasized that in order to deal with cyber attacks on energy companies, action must be taken mainly in two ways: paying attention to revealing too much information in social networks and creating a response plan in case of a cyber attack taking place.
But dealing with results is not enough. Another spokesperson involved in matter and national and public security in the communications field in the United States claims that preventive actions must also be taken to minimize risks for a cyber attack in the future. 

Defending against hacktivist is a matter that may cost a lot of money, but eventually it is about a secured work place that rests mostly on using non-banal passwords that cannot be revealed easily.
I-HLS: http://bit.ly/1GWKaiz

 

 

« Who Is In Charge if a Massive Cyber Attack Strikes the U.S?
Essential Cyber Security Tips to Stay Safe Travelling »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Brookings Institution

Brookings Institution

The Brookings Institution is a nonprofit public policy organization. Cyber security is covered within the various study areas.

Centrify

Centrify

Centrify’s Next-Gen Access is an identity & access management solution that uniquely converges Identity-as-a-Service, enterprise mobility management and privileged access management.

Dataguise

Dataguise

Dataguise provides a data-centric security solution to detect, protect, and monitor sensitive data in real time across all data repositories, both on premises and in the cloud.

Sigma Payment Solutions

Sigma Payment Solutions

Sigma Payment Solutions offers a comprehensive suite of automated payment processing services, solutions, and technology to businesses in the USA.

ENEA Qosmos Division

ENEA Qosmos Division

Qosmos, a division of Enea, leads the market for IP traffic classification and network intelligence technology used in physical, SDN and NFV architectures.

HudsonCyber

HudsonCyber

HudsonCyber, part of HudsonAnalytix, provides leading cyber risk management services for the global maritime transportation industry.

United Nations Office on Drugs & Crime (UNODC)

United Nations Office on Drugs & Crime (UNODC)

UNODC promotes long-term and sustainable capacity building in the fight against cybercrime through supporting national structures and action.

Exeon Analytics

Exeon Analytics

Exeon Analytics is a Swiss cyber security company that is specialized in detecting hidden data breaches and advanced cyber attacks.

European Cyber Security Conference

European Cyber Security Conference

EU Cyber Security Conference will debate what Europe’s response to evolving threats in a dynamic global risk landscape should look like and what the next steps for all actors of the ecosystem.

PeckShield

PeckShield

PeckShield is a blockchain security company which aims to elevate the security, privacy, and usability of entire blockchain ecosystem by offering top-notch, industry-leading services and products.

Kiuwan

Kiuwan

Kiuwan provide software security solutions with SAST and SCA source-code analysis that fit into your DevOps process.

vCISO Services

vCISO Services

vCISO Services is a small, specialized, veteran-owned firm focused on the needs of SMBs only.

Sealing Technologies (SealingTech)

Sealing Technologies (SealingTech)

SealingTech is a leader in cutting edge research, products, engineering, and integration services in the Internet of Things, Edge, Machine Learning, Artificial Intelligence, and Cloud.

Tuta

Tuta

Tuta (formerly Tutanota) is an all-in-one email, calendar and contacts app which protects your data with full end-to-end encryption and it requires zero personal information.

Lansweeper

Lansweeper

Lansweeper is an IT Asset Management platform provider helping businesses better understand, manage and protect their IT devices and network.

ThreatView by Turaco Labs

ThreatView by Turaco Labs

ThreatView combines extensive experience in digital forensics with advanced analytics and threat detection capabilities to protect eCommerce websites.