Unfortunately it is not illegal to publish vulnerbility or sell attack code. My understanding is that it isn't likley to change either - it is possible to make specific acts illegal (such as hacking), but restricting the sharing of information runs into Freedom of Speech issues.
Plus the fact that people can just post the tools on a foreign website (e.g. Gleg is in Russia) makes enforcement really tough.
The best way to discourage disgruntled emplyees from causing harm or criminals from stealing and selling secrets is to make it more trouble to do than it is worth. Bad guys only stopped robbing trains and stage coaches when the difficulty of achieving sucess exceeded the likelyhood of a making money. In otherwords, the RoI in hacking needs toi change to make it unprofitable. Right now it is too easy and too profitable.
Unfortunately, for many companies, there still is a conflict between engineers and IT departments when it comes to security. This is bad, becuase it often leave a gaps for the bad guy to slip in.
The main reason for the conflict are the different UNSTATED assumptions between IT and automation. For example, there is often an assumption in IT that a short reboot of a system is not an issue, especially if it happens at midnight. Obviously automation engineers don't agree.
Getting these these assumption in the open and deciding on how to address the differences if the key to solving the issues. Good companies (Dow Chemicals comes to mind) have really found a way for that dialog to occur.
The two crucial terms used in ISA 62443 2-1 standard are Zones and Conduits. But I am slow typist so I can point you to a detailed white paper on the topic at http://web.tofinosecurity.com/download-the-white-paper-using-ansi-/-isa-99-standards-to-improve-control-system-security
It defines most of the key terms. The other place is the actual ISA 62443 2-1 standard. Unfortunately you must purchase that from www.isa.org
The biggest biggest threat right now is likely the disgruntled employee. However over the next few years, for most companies it will be a mix of organized crime and competitors. For companies with high strategic value (like oil and gas) foreign government agencies are a significant risk. Terrorists are low on the list for me.
Greetings everyone! The streaming audio player will appear on this web page when the show starts at the top of the hour today. Note however that some companies block live audio streams. If when the show starts you don't hear any audio, try refreshing your browser. You can hit the F5 key to refresh.
-The streaming audio player will appear on this web page when the show starts at 12 pm Eastern today. Note however that some companies block live audio streams. If when the show starts you don't hear any audio, try refreshing your browser.
Engineers at Fuel Cell Energy have found a way to take advantage of a side reaction, unique to their carbonate fuel cell that has nothing to do with energy production, as a potential, cost-effective solution to capturing carbon from fossil fuel power plants.
To get to a trillion sensors in the IoT that we all look forward to, there are many challenges to commercialization that still remain, including interoperability, the lack of standards, and the issue of security, to name a few.
This is part one of an article discussing the University of Washingtonís nationally ranked FSAE electric car (eCar) and combustible car (cCar). Stay tuned for part two, tomorrow, which will discuss the four unique PCBs used in both the eCar and cCars.
Focus on Fundamentals consists of 45-minute on-line classes that cover a host of technologies. You learn without leaving the comfort of your desk. All classes are taught by subject-matter experts and all are archived. So if you can't attend live, attend at your convenience.