HOME  |  NEWS  |  BLOGS  |  MESSAGES  |  FEATURES  |  VIDEOS  |  WEBINARS  |  INDUSTRIES  |  FOCUS ON FUNDAMENTALS
  |  REGISTER  |  LOGIN  |  HELP
Blogs
Blog

Is Your Network Safe?

NO RATINGS
View Comments: Oldest First|Newest First|Threaded View
<<  <  Page 3/3
Rob Spiegel
User Rank
Blogger
Re: The only "safe" network is one you can't use
Rob Spiegel   11/30/2012 1:48:33 PM
NO RATINGS
Ab3a, thanks for all the detail. That helps a lot. But I have an oddball question. When it comes to security, who are the likely enemies?

ab3a
User Rank
Platinum
Re: The only "safe" network is one you can't use
ab3a   11/30/2012 2:09:00 PM
NO RATINGS
We would like to think that we're defending against evil script kiddies living in their Mom's Basment, or some foreign hacker working for a government agency. So many decide to defend against the faceless Man-In-The-Middle attacks because they're an easy sell to management. But that's not what experince has shown. 

In reality most of them are your co-workers.  Yes, the ones you drink coffee with every morning.  Aside of the flimsy and unstable designs or configurations, it usually takes extensive inside knowledge to do real, lasting damage to most control sytems.

That's why the most notorious cases are usually the work of insiders. 

 

Jake Brodsky

 

Rob Spiegel
User Rank
Blogger
Re: The only "safe" network is one you can't use
Rob Spiegel   11/30/2012 3:53:16 PM
NO RATINGS
Jake, that's what I've always thought. The disgruntled employee is the most dangerous hacker. That employee is the one who knows where are the buttons and levers are.

<<  <  Page 3/3
Partner Zone
More Blogs
Enabling the Future is designing prosthetic appendages modeled more like superhero arms and hands than your average static artificial limbs. And they’re doing it through a website and grassroots movement inspired by two men’s design and creation in 2012 of a metal prosthetic for a child in South Africa.
In order to keep an enterprise truly safe from hackers, cyber security has to go all the way down to the device level. Icon Labs is making the point that security has to be built into device components.
Three days after NASA's MAVEN probe reached Mars, India's Mangalyaan probe went into orbit around the red planet. India's first interplanetary mission, and the first successful Mars probe launched by an Asian nation, has a total project cost of nearly $600 million less than MAVEN's.
Sega is releasing a new futuristic sandbox that uses height sensors and projection mapped projectors to cast pictures that correspond to what you're making.
Plant user interfaces are beginning to incorporate the consumer features such as swipe, double tap, and pinch. The driver is Millennials who expect plant equipment to match the sophistication of the smartphone.
Design News Webinar Series
9/25/2014 11:00 a.m. California / 2:00 p.m. New York
9/10/2014 11:00 a.m. California / 2:00 p.m. New York
7/23/2014 11:00 a.m. California / 2:00 p.m. New York
7/17/2014 11:00 a.m. California / 2:00 p.m. New York
Quick Poll
The Continuing Education Center offers engineers an entirely new way to get the education they need to formulate next-generation solutions.
Oct 20 - 24, How to Design & Build an Embedded Web Server: An Embedded TCP/IP Tutorial
SEMESTERS: 1  |  2  |  3  |  4  |  5  |  6


Focus on Fundamentals consists of 45-minute on-line classes that cover a host of technologies. You learn without leaving the comfort of your desk. All classes are taught by subject-matter experts and all are archived. So if you can't attend live, attend at your convenience.
Next Class: October 1 - 30
Sponsored by Gates Corporation
Learn More   |   Login   |   Archived Classes
Twitter Feed
Design News Twitter Feed
Like Us on Facebook

Sponsored Content

Technology Marketplace

Copyright © 2014 UBM Canon, A UBM company, All rights reserved. Privacy Policy | Terms of Service