After Stuxnet: The New Rules Of Cyberwar
Critical infrastructure providers face off against a rising tide of increasingly sophisticated and potentially destructive attacks emanating from hacktivists, spies and militarized malware.
Three years ago, when electric grid operators were starting to talk about the need to protect critical infrastructure from cyberattacks, few utilities had even hired a chief information security officer. Then came Stuxnet. In 2010, that malware, widely reported to have been created by the U.S. and Israel, reportedly destroyed 1,000 centrifuges that Iran was using to enrich uranium after taking over the computerized systems that operated the centrifuges.
Gen. Michael Hayden, principal at security consultancy The Chertoff Group, was director of the National Security Agency, and then the CIA, during the years leading up to the event. "I have to be careful about this," he says, "but in a time of peace, someone deployed a cyberweapon to destroy what another nation would describe as its critical infrastructure." In taking this step, the perpetrator not only demonstrated that control systems are vulnerable, but also legitimized this kind of activity by a nation-state, he says.
The attack rattled the industry. "Stuxnet was a game-changer because it opened people's eyes to the fact that a cyber event can actually result in physical damage," says Mark Weatherford, deputy undersecretary for cybersecurity in the National Protection Programs Directorate at the U.S. Department of Homeland Security...
- Tags:
- critical infrastructure
- Cyber Intelligence Sharing and Protection Act (CISPA)
- cybersecurity
- cyberwar
- Department of Defense (DoD)
- Department of Homeland Security (DHS)
- distributed denial-of-service (DdoS)
- Edward Amoroso
- espionage
- hackers
- hacking
- Howard Schmidt
- James Lewis
- John Pescatore
- Keith Alexander
- Leon Panetta
- malware
- Mark Weatherford
- Marty Edwards
- Melissa Hathaway
- Michael Hayden
- National Cybersecurity and Communications Integration Center (NCCIC)
- Paul Kurtz
- privacy
- Richard Bejtlich
- security
- spear phishing
- spies
- Stuxnet
- Tim Roxey
- zero-day attacks
- Login to post comments