WORLDWIDE NETWORK ENTERPRISES
  • HOME
  • IBM
    • IBM Cloud
    • Data and AI
    • IT Infrastructure
    • IBM Security
    • IBM Services
    • Watson Internet Of Things
    • Watson Works
    • IBM Sterling
    • IBM Global Financing
  • NEC SHOWCASE
    • NEC SL2100
  • DEBIT MY DATA
  • HOMELAND SECURITY
    • TIPS/REWARDS
    • HOMELAND AIR DEFENSE (HAD)
  • LOGISTICS//FULFILLMENT
  • ABOUT US
    • WORLDWIDE NETWORK ENTERPRISES, INC.
    • WORLDWIDE NETWORK INVESTIGATIONS
    • WORLDWIDE NETWORK AG HOLDINGS
    • MORE ABOUT US
    • Media
    • Ad Specifications
    • Affiliates
    • Privacy Policy
    • Terms and Conditions
  • MEME SUBSCRIPTION
    • FUTUROLOGY
    • SOCIAL ENGINEERING
    • MEME TRENDS AFFILIATES
    • RESEARCH AND ABSTRACTS
    • MEME SUBMISSIONS
    • PAYMEME DAILY JOB MARKET
    • PAYMEME DAILY NETWORK
  • BLOG
  • AFFILIATE PORTFOLIO
  • L’Occitane en Provence
  • AGOVERSE

Why Security Holes In Critical Infrastructure Are So Darn Hard To Fix

4/30/2013

2 Comments

 
Picture
By Antone Gonsalves


Security researchers recently found gaping vulnerabilities in a wide variety of critical business and industrial equipment. It turns out that weak or absent passwords made it easy to break into more than 100,000 terminal servers used to provide their Internet connections. Fixing the problem is simple. Change the credentials dramatically reduces the risk. But for many companies, actually solving the problem is nearly impossible.

Vulnerable, But Hidden The threats discovered by security firm Rapid7 exemplify the difficulties organizations face in plugging even known holes in critical gear. In this case, the affected systems include industrial control equipment, traffic-signal monitors, fuel pumps, retail point-of-sale terminals and building automation equipment such as alarms and heating and ventilation (HVAC) systems.

Rapid7 found more than 114,000 unprotected terminal servers, mostly from Digi International or Lantronix, that a hacker could use to take control of the underlying systems. Finding the serial ports on the server requires the use of a scanning tool, such as Nmap. Once an active port is found, a command-line program similar to what those used in 1980s vintage home computers is all that's needed to access a control panel or menu or capture data.

Fortunately, while tech-savvy saboteurs or terrorists would have no difficulty gaining access to the equipment, they most likely would not know who owns it or where it is located. Without that information, the find would not be very useful. "There's no telling who they are going to hurt, if they don't know where the device is," explained HD Moore, chief research officer for Rapid7.

How Security Gets Missed Nevertheless, any hole that can provide access to critical equipment is worth plugging, but it's not likely to happen in many of these cases. Often, companies do not even know the terminal server exists, much less that it needs security updates.

How is that possible? Well, picture a vendor working with the facilities crew installing an HVAC system that uses a terminal server so the equipment can be monitored from a remote location. No one knows the server exists, and no one cares, as long as everything works. "A lot of times IT is not even aware of these systems," said Matthew Neely, director of research at risk management company SecureState.

Vendor marketing can also exacerbate the problem. Equipment is often sold as being "secured," when in fact it is only "capable of being secured." That means the buyer still has to add the technology or turn on and configure the security features.

This can get missed if the installers assume the equipment is "plug and play," said Joe Weiss, a security consultant for Applied Control Solutions. "It's like getting a toy for Christmas and you pull it out of the box expecting it to run, because the box doesn't tell you it needs two AA batteries," Weiss added.

Terminal servers, also called serial port servers, often get missed by electric utility companies because they are not covered under federal cybersecurity requirements. So the devices never make it on the utility's compliance checklist. "They don't even have to check these out to find out if they are or not secure," Weiss said.

This bizarre situation demonstrates that ensuring the security of critical equipment is never a matter of technology alone. True security requires people to pay attention, not just sweep everything under the rug.


2 Comments

Can an open events venue really be considered secure? 

4/18/2013

3 Comments

 
Picture
by Steve Lasky
Created: April 16, 2013

By the very nature of the venue, protecting events such as the Boston Marathon are nearly impossible. The bombings at Monday’s race that killed three and injured more than 140 spectators, highlights the frustration encountered by both the private sector and law enforcement when attempting to secure such a public, open event.

The challenge is monumental: Secure an area that encompasses more than 26-miles of public roadway with no protected perimeter or focused areas of ingress or egress; along with spectators who line both sides of the street along the course and are encouraged to bring their own coolers and backpacks as they cheer on the thousands of runners.

In a little more than two months, Atlanta will be hosting one of the three biggest marathons in country, the Peachtree Road Race. Tracey Russell, Executive Director for the Atlanta Track Club, which organizes the AJC Peachtree Road Race, released the following statement regarding Monday's bombings at the Boston Marathon: “We are deeply saddened to hear the news of today's events in Boston. Safety at every Atlanta Track Club event is our top priority. As it relates to security with any large-scale event in Atlanta, we work very closely with the City's Police and Fire Departments and Emergency Medical Service units, as well as the Federal Emergency Management Agency and additional government agencies. Our hearts go out to the entire Boston community and the victims affected by this tragedy."

Atlanta is no stranger to big events or the tragedies that sometimes accompany them. The city just hosted the NCAA’s Final Four college basketball championships earlier this month without incident; however, the memories of the Olympic Centennial Park bombings during the 1996 Olympic Games have colored preparation for large events ever since.

According to David Wardell, vice president, operations and public safety for the Central Atlanta Progress and Atlanta Downtown Improvement District, preparation for the Final Four began more than five months ago and continued right up until tip off. The City of Atlanta coordinated training exercises and collaborated with federal, state and local law enforcement for joint security and emergency preparedness drills and training. “We have been involved with DHS to train and prepare those involved from the FBI, Georgia World Congress Center security staff and Atlanta Police Department,” he says. “This had been an entire private sector/public safety effort, with coordination from police, fire, and other first responders. Everything that was done was very comprehensive. Preparation went far beyond just guns and badges.

“Because of our experience with the Olympic bombings, we are extremely cautious when it comes to open-venue events,” Wardell continues. “The public expects a high level of security and they accept it. The Final Four was second only to the Olympics in our level of security preparation.”

Pointing out the national magnitude of the event and the sheer volume of spectators the event brought to the downtown area, Wardell instituted educational symposiums for his staff in security and emergency preparedness that outlined basic response scenarios. “Bottom line, in large open events like this, is you need to understand who your partners are and what resources you have at your disposal,” Wardell says. “It is key to create a unified communications structure and command organization, and there has to be a real spirit of cooperation to make it work.”

Wardell believes the officials at the Boston Marathon did their due diligence and provided the most secure environment possible for fans and runners. “Unless you close off the entire venue, they did all they could do,” he says. “Securing a 26-mile course would be so manpower-intensive that it is just not feasible. You would have to bring in the military for such tactics. Now that is done for a Presidential move, but for an event like this, it would be overkill and much too cost-prohibitive.”

David Holley, a senior managing director for the Boston office of Kroll echoes the sentiment that events such as the Boston Marathon present huge security challenges. “Another difficulty in protecting an event like a marathon is the fact that there are no assigned seats and the spectator crowd is generally mobile,” he wrote in an article published The New York Daily News. “Moving from place to place to secure a better view, watch friends go by, or work their way down to the finish, the crowd is generally always in motion. Knapsacks and handbags are picked up and put down countless times, and frequently forgotten at the last location, making it difficult to determine whether an object has been abandoned or unintentionally left behind."

Indeed, the mess of “left behinds” after an event like a marathon is a daunting task to sift through and dispose of, he added. These things make it difficult to monitor and secure open-venue events, but it is also what makes them wonderful events to attend, he said.

Wardell agrees that having the ability to screen fans at specific ingress points is the most important difference between his Final Four and the marathon. “For the Final Four, even though we had open venues, they all had defined perimeters with access control — even if that access control was just staring at you and doing bag checks,” he says. “Fans and vendors (at the Final Four) were required to go through a gauntlet or checkpoint that allowed for screening. At the marathon, you had people standing 50-feet deep, sitting at cafes along the route. How do you prepare for that?




3 Comments

Officials: 144 injured, 3 dead, as two huge blasts rock Boston Marathon finish line 

4/15/2013

1 Comment

 
   PLEASE SUBMIT BOSTON MARATHON EXPLOSION TIPS
1 Comment

Philosophical discussion about post-/trans-humanism, humanism, and Kurzweil's Singularity timeline

4/11/2013

0 Comments

 
0 Comments

RUSSIA'S GOAL FOR HUMANITY : THE TRANSFORMATION AND THE CONVERGENCE OF SOCIAL MEDIA NETWORKS AND HUMAN BEINGS  INTO AVATARS/ROBOTS OF A NEW ERA- NEOHUMANITY

4/9/2013

7 Comments

 
Space War... Cold War...Now the dawn of a new era...Neuro War

Project Avatar, Android robotics, Anthropomorphic telepresence, Neuroscience, Mind theory, Neuroengineering, Brain-Computer Interfaces, Neuroprosthetics, Neurotransplantation, Long-range forecasting, Future evolution strategy, Evolutionary transhumanism, Ethics, Bionic prostheses, Cybernetic life-extension, Mid-century Singularity, Neo-humanity, Meta-intelligence, Cybernetic immortality, Consciousness, Spiritual development, Science and Spirituality. 
7 Comments

Vernor Vinge: How to Prepare for the Singularity

4/7/2013

0 Comments

 
0 Comments

    RSS Feed

    Author

    Preska Thomas

    Archives

    June 2013
    May 2013
    April 2013
    March 2013

    Categories

    All

Privacy Policy   Terms of Use   Advertise With Us  

© 1996-2022, Worldwide Network Enterprises, Inc., Assign or Affiliates All rights reserved 
                                                                    
5G, Phone system, IBM, AT&T, Direct TV, Broadband, Fiber, NEC, TSI, Collections, Century Link, Frontier, Phone lines, Land lines, Internet, Cellular service, Carrier Service, IT, GSA, Government contract, Viasat satellite, 

​SL2100, PHONE SYSTEM, PORT SAINT LUCIE FLORIDA PHONE SYSTEM, BROWARD COUNTY PHONE SYSTEM, ST.LUCIE COUNTY PHONE SYSTEM

Preska Thomas