Segurança de Sistema em Plataformas de petróleo

download Segurança de Sistema em Plataformas de petróleo

of 6

Transcript of Segurança de Sistema em Plataformas de petróleo

  • 8/3/2019 Segurana de Sistema em Plataformas de petrleo

    1/6

  • 8/3/2019 Segurana de Sistema em Plataformas de petrleo

    2/6

    How Hackers Could Take Down aNatural Gas Pipeline

    Much of America's infrastructure is computer-controlled, and therefore subject tohacking. It's a subject we take on in depth in our April cover story aboutpreventing cyber attacks on U.S. soil . Here is an in-depth look at the specificvulnerabilities of a natural gas pipeline, and a status check on the security of fivekey sectors of U.S. infrastructure.

    By Glenn DereneIllustrations by Transluszent and DogoPublished in the Apr il 2009 issue.

    http://popularmechanics.prelive.smartmoney.com/technology/military_law/4307521.htmlhttp://popularmechanics.prelive.smartmoney.com/technology/military_law/4307521.htmlhttp://popularmechanics.prelive.smartmoney.com/technology/military_law/4307521.html
  • 8/3/2019 Segurana de Sistema em Plataformas de petrleo

    3/6

  • 8/3/2019 Segurana de Sistema em Plataformas de petrleo

    4/6

    INTERNET ATTACK

    Where: Remote Location Attackers have a variety of options for breaking into an industrial facilitys operations:Often, control systems are connected to corporate systems, so commonly knownWindows or server vulnerabilities can open a back door into the control room. Someequipment may be so old that it is accessible by dial-up modem. Hackers can search forvulnerable equipment by using a war -dialer program that automatically calls th rougha list of phone numbers looking for modems.

    Protection: Experts advocate placing firewalls between corporate networks and controlsystems and installing access-control software on old equipment.

    BREAK-IN

    Where: Compressor Station Pipelines and other sprawling infrastructure systems have many remote, unmannedsubstations. Entry is often a matter of cutting a fence and jacking into the controls with

    a laptop. Many facilities have wireless access points that could allow attackers to log infrom a distance no bolt cutters required.

    Protection: Cyber security often means physical security, such as taller fences andtougher locks. Plus, wireless access for critical control systems should be password-protected.

  • 8/3/2019 Segurana de Sistema em Plataformas de petrleo

    5/6

    CASCADE EFFECT

    Where: Power Plant An attack on one utility can cripple downstream facilities. For example, nearly half theelectrical power in California is generated using natural gas. A cyber attack oncompressor stations that fuel electrical power plants could result in multistate blackouts.

    Protection: Upcoming Smart Grid tech will add intelligence to control systems,automatically rerouting power during a crisis.

    Status Check: 5 Vulnerable Sectors

    Transportation Railroads, ship-yards, airports and city traffic systems all rely oncentralized computer networks to run smoothly. Last year two Los Angeles trafficengineers pled guilty to accessing the Automated Traffic Surveillance Center andshutting down four traffic lights to influence a union dispute.

    Finance Modern banking is entirely reliant on digital money transfer and computer data- bases. In January, a tech contractor was indicted for planting a digital logic bomb onmortgage giant Fannie Maes servers. The malicious code was designed to destroy alldata on the companys network.

    Telecom The bad news is that telecommunications connects everything, andvulnerabilities are manifest. The good news is that the sprawling system is hard toknock out of commission because of redundant connections across widely distributedfiberoptic lines and backbone computers.

    Water It may not be the first target most people think about, but the outdated computer-control systems that regulate the flow of water and wastewater could make easy targetsfor hackers. In 2006, computers at a Harrisburg, Pa., water-filtering plant were hijackedfor the distribution of spam e-mail.

    Energy Americas oil and gas pipelines and electrical grid depend on an awkwardmarriage of antiquated control-system hardware and modern information technology.The infrastructure itself is spread over vast distances and owned by multiple companies.Here are five cyber- security holes in the nations energy network and ways to fixthem.

    Material retirado do site Popular Mechanics:http://www.popularmechanics.com/technology/military_law/4307528.html

    http://www.popularmechanics.com/technology/military_law/4307528.htmlhttp://www.popularmechanics.com/technology/military_law/4307528.htmlhttp://www.popularmechanics.com/technology/military_law/4307528.html
  • 8/3/2019 Segurana de Sistema em Plataformas de petrleo

    6/6