|
Annual reports issued by Homeland Security and the Department of Energy have detailed weaknesses in the industrial computer systems, and have repeatedly pressed companies to improve security practices. Reports as recently as this May urged companies to routinely download patches to update software, change and improve passwords, carefully restrict access to critical systems and use firewalls to separate commonly used networks from those that control key systems. A successful attack against a critical control systems, the Energy Department warned in its May report, "may result in catastrophic physical or property damage and loss." Over the past year, Homeland Security has quietly been deploying teams of experts around the country to assess weaknesses in industrial control systems. The agency has created four teams and
-- with a budget scheduled to increase from $10 million this year to $15 million next year
-- has plans to grow to 10 teams in 2011 The teams are armed with a $5,000 kit: a black, suitcase-sized bag crammed with cables, converters, data storage and high-tech computer forensic tools. With that equipment, they can download the problem malware, analyze it and work with the companies to correct or clean their systems. So far, said McGurk, the teams have done 50 assessments and have been dispatched 13 times to investigate and help correct cyber incidents and attacks. Nine of those cases involved some type of deliberate cyber intrusion, while the other four were the unintended result of an operator's action. In one of the nine intrusion cases, a company representative had gone to a conference and had the presentation documents downloaded onto a computer flash drive. One of the files was infected with the Mariposa botnet, a malicious software code that has infected 12 million computers worldwide, including hundreds of companies and at least 40 major banks in 190 countries since appearing in December 2008. When the man returned to his office and connected his laptop to the company's network, the botnet spread, eventually affecting nearly 100 computers. A Homeland Security team was called in and helped the company evaluate the problem and begin to clear up the system. ___ Online: U.S. Computer Emergency Readiness Team:
http://www.us-cert.gov/control-systems/csfaq.html
[Associated
Press;
Copyright 2010 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.
News | Sports | Business | Rural Review | Teaching & Learning | Home and Family | Tourism | Obituaries
Community |
Perspectives
|
Law & Courts |
Leisure Time
|
Spiritual Life |
Health & Fitness |
Teen Scene
Calendar
|
Letters to the Editor