We discuss some of the system at risk in computer network toward individuals, businesses, industries and governments, under the context of Computer Network Defense (CND). Computer network attacks can take in many forms, including mission critical server and system compromises, information theft (from inside intruder or external hacker) and denial-of-service (DoS) attacks designed to rattle services. Under the modern digital economy, most people rely on the Internet for many of their professional, social and personal activities. The expansion in the number of computer systems and the rising dependence of individuals, businesses, industries and governments toward computer system means that there are an increasing number of systems at danger, if do not proper safeguard your computer networks.
In the industrial equipment industry computers handle the functions at many utilities such as coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks, in particular we refer for ICS/SCADA systems. Most machines are endangered from potential attack if connected with the internet but in some cases even the equipment that controlled by computers is offline there still exposed to such threat. For example the Stuxnet worm that can attack machine handled by computer even it not connected to the internet.
Nowadays, in the automobile industry most of the vehicles have been computerized widely such as engine timing, cruise control, anti-lock brakes, door locks, airbags and advanced driver-assistance systems. Some of these features need to connect with third party devices in enabling them to function by using WiFi and Bluetooth. By doing so without proper security system, people can easily hijack the car. For example compact disc being used as an attack aim and the car’s microphones being used for eavesdropping.
Most common computer network system getting attack are in government and military service. Usually attack by activists and foreign powers. For example, a well known case forRussian hackers have been alleged of interfering with the voting systems in the 2016 U.S. presidential election and also with the Ukrainian businesses and governmental agencies. Others such as passports and government ID cards which can be duplicated or government infrastructure like traffic light controls, student records or financial systems that have been broadly computerized.
Based on what we have been discussing, we live in the world that technologies become largely of our daily life. Everything from doing our basic daily routine or send people to outer space, everything has been automated by computer. So it crucial to ensure the computer network we use is secure from any possible attack.
Feel free to contact E-SPIN for the various cyber security and infrastructure governance and monitoring solution, from governance-risk-compliance (GRC), NetOps, ITOM, Cyber Exposure Management to cloud computing security requirement and project.