HOME  |  NEWS  |  BLOGS  |  MESSAGES  |  FEATURES  |  VIDEOS  |  WEBINARS  |  INDUSTRIES  |  FOCUS ON FUNDAMENTALS
  |  REGISTER  |  LOGIN  |  HELP
Blogs
Blog

Is Your Network Safe?

NO RATINGS
View Comments: Oldest First|Newest First|Threaded View
<<  <  Page 3/3
Rob Spiegel
User Rank
Blogger
Re: The only "safe" network is one you can't use
Rob Spiegel   11/30/2012 1:48:33 PM
NO RATINGS
Ab3a, thanks for all the detail. That helps a lot. But I have an oddball question. When it comes to security, who are the likely enemies?

ab3a
User Rank
Platinum
Re: The only "safe" network is one you can't use
ab3a   11/30/2012 2:09:00 PM
NO RATINGS
We would like to think that we're defending against evil script kiddies living in their Mom's Basment, or some foreign hacker working for a government agency. So many decide to defend against the faceless Man-In-The-Middle attacks because they're an easy sell to management. But that's not what experince has shown. 

In reality most of them are your co-workers.  Yes, the ones you drink coffee with every morning.  Aside of the flimsy and unstable designs or configurations, it usually takes extensive inside knowledge to do real, lasting damage to most control sytems.

That's why the most notorious cases are usually the work of insiders. 

 

Jake Brodsky

 

Rob Spiegel
User Rank
Blogger
Re: The only "safe" network is one you can't use
Rob Spiegel   11/30/2012 3:53:16 PM
NO RATINGS
Jake, that's what I've always thought. The disgruntled employee is the most dangerous hacker. That employee is the one who knows where are the buttons and levers are.

<<  <  Page 3/3
Partner Zone
More Blogs
Design collaboration now includes the entire value chain. From suppliers to customers, purchasing to outside experts, the collaborative design team includes internal and external groups. The design process now stretches across the globe in multiple software formats.
Researchers have developed a hybrid energy harvester for generating electricity from multiple spectrums of solar energy.
These futuristic military robots will help soldiers and other military personnel better perform their duties.
Icon Labs has developed a whitepaper to help determine the type of cybersecurity needed based on the type of device.
We're talking a look at 10 of the coolest technologies being developed by the US military today. In addition to saving lives on the battlefield, don't be surprised if you see some of these in your daily life some time in the near future.
Quick Poll
The Continuing Education Center offers engineers an entirely new way to get the education they need to formulate next-generation solutions.
SEMESTERS: 1  |  2  |  3  |  4  |  5  |  6 |  7 | 8 | 9


Focus on Fundamentals consists of 45-minute on-line classes that cover a host of technologies. You learn without leaving the comfort of your desk. All classes are taught by subject-matter experts and all are archived. So if you can't attend live, attend at your convenience.
Learn More   |   Login   |   Archived Classes
Twitter Feed
Design News Twitter Feed
Like Us on Facebook

Technology Marketplace

Copyright © 2016 UBM Canon, A UBM company, All rights reserved. Privacy Policy | Terms of Service