Professional Documents
Culture Documents
Introduction
● ICS are a High Value Target (!)
● rival nations’ want to attack each others infrastructure
● hackers want to collect ransom
● hacktivists want to disrupt business
● ICS are growing at 6.6% as new projects come online and are
controlled across global networks
ICS Attack Highlights
● Stuxnet (2010) – four “0-days”, infected 200k+ computers and
damaged 1000 centrifuges.
● https://www.oilandgas-blog.com/en/anatomy-cyber-attack-1/
● https://www.oilandgas-blog.com/en/counter-measures-cyber-attack/
● https://ccdcoe.org/library/publications/12th-international-conference-on-
cyber-conflict-20-20-vision-the-next-decade-proceedings-2020/
● https://www.theregister.com/2016/03/24/water_utility_hacked/