<div class="custm_img_blk"><img src="http://www.techgig.com/files/photo_1337045969_temp.jpg" border="0" align="left" /></div><p style="margin-top: 0px; margin-right: 0px; margin-bottom: 18px; margin-left: 0px; border-style: initial; border-color: initial; border-image: initial; outline-width: 0px; outline-style: initial; outline-color: initial; vertical-align: baseline; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; border-width: 0px; padding: 0px">Nothing sends shivers down my spine quite like a hypothetical in which someone sets a whole block on fire after cutting off the fire department’s electric supply in order to slow its response. It’s a scary thought, but not entirely unplausible. Perhaps it should give us some peace of mind, though, to know that armed with the right tools and, more importantly, the right mindset, these types of attacks might be preventable.</p><p style="margin-top: 0px; margin-right: 0px; margin-bottom: 18px; margin-left: 0px; border-style: initial; border-color: initial; border-image: initial; outline-width: 0px; outline-style: initial; outline-color: initial; vertical-align: baseline; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; border-width: 0px; padding: 0px">The topic came up during a recent call with Splunk’s director of security and compliance solutions, Mark Seward, after the FBI and Department of Homeland Security named Splunk as part of its toolkit for <span style="border-style: initial; border-color: initial; border-image: initial; outline-style: initial; outline-color: initial; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: transparent">investigating a potential cyberattack on an Illinois gas pipeline</span>. That turned out to be a false alarm, but I was troubled by the notion that we were only doing data analysis forensically, after the fact. Pipelines are <span style="border-style: initial; border-color: initial; border-image: initial; outline-style: initial; outline-color: initial; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: transparent">still under heavy attack</span>. Forget finding out who did it; I want events stopped before they happen.</p><p style="margin-top: 0px; margin-right: 0px; margin-bottom: 18px; margin-left: 0px; border-style: initial; border-color: initial; border-image: initial; outline-width: 0px; outline-style: initial; outline-color: initial; vertical-align: baseline; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; border-width: 0px; padding: 0px">Seward said that’s possible, but not easy. Attackers have gotten so good, he said, and have such diverse attack vectors that it’s hard to predict what will happen when. “Security professionals have to harness the creativity of their minds to start thinking like a criminal,” he explained. They have to “think creatively about how someone would go about disrupting [a] service and what footprints would they leave behind.”</p><p style="margin-top: 0px; margin-right: 0px; margin-bottom: 18px; margin-left: 0px; border-style: initial; border-color: initial; border-image: initial; outline-width: 0px; outline-style: initial; outline-color: initial; vertical-align: baseline; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; border-width: 0px; padding: 0px">When that happens, it becomes possible to watch data in real-time and identify anomalies or put together patterns that suggest an attack might be underway. Splunk actually has a SCADA tool for pipelines that would let someone see changes in sensor data in real time, Seward said, in order to detect locations that stopped reporting or changes in pressure. Or maybe it’s as simple as noticing someone trying to access an application via <span style="border-style: initial; border-color: initial; border-image: initial; outline-style: initial; outline-color: initial; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: transparent">Active Directory</span>without permission.</p><p style="margin-top: 0px; margin-right: 0px; margin-bottom: 18px; margin-left: 0px; border-style: initial; border-color: initial; border-image: initial; outline-width: 0px; outline-style: initial; outline-color: initial; vertical-align: baseline; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; border-width: 0px; padding: 0px">Seward said smart meters — and the electric grid, in general — are particularly important to monitor. In the case of smart meters, which are constantly sending usage data to power companies, employees could quickly correlate meter shutoffs with work orders on those buildings and GPS data to determine whether a company truck is at the site. At a small scale, Seward said, robbers monitoring smart grid data could identifiy houses to rob by looking for consumption footprints that suggest nobody’s home. At a large scale, they could try to power down air-traffic control towers, first-responder buildings or the utility providing water to cool rods at a nuclear power plant.</p><p style="margin-top: 0px; margin-right: 0px; margin-bottom: 18px; margin-left: 0px; border-style: initial; border-color: initial; border-image: initial; outline-width: 0px; outline-style: initial; outline-color: initial; vertical-align: baseline; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; border-width: 0px; padding: 0px">It’s a concern he shares with former CIA director James Woolsey, who <span style="border-style: initial; border-color: initial; border-image: initial; outline-style: initial; outline-color: initial; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: transparent">discussed the vulnerability of the grid</span> and the need for the innovative minds working on smart-grid technologies to solve it at our Structure: Data conference in March.</p><p style="margin-top: 0px; margin-right: 0px; margin-bottom: 18px; margin-left: 0px; border-style: initial; border-color: initial; border-image: initial; outline-width: 0px; outline-style: initial; outline-color: initial; vertical-align: baseline; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; border-width: 0px; padding: 0px">If there’s some solace to take away from talking about our national-security vulnerabilities, though, it might be that technology appears to be stepping up to help identify threats. Aside from Splunk, which is <span style="border-style: initial; border-color: initial; border-image: initial; outline-style: initial; outline-color: initial; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: transparent">useful for monitoring machine-generated data in real time</span>, there also tools such as Hadoop that can <span style="border-style: initial; border-color: initial; border-image: initial; outline-style: initial; outline-color: initial; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: transparent">assist in identifying past attack patterns</span> that systems can be trained to watch out for in the future. As I’ve reported before, security software is actually<span style="border-style: initial; border-color: initial; border-image: initial; outline-style: initial; outline-color: initial; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: transparent">proving to be an early hotspot for big technologies</span>, and it’s hard to see that trend slowing down. The <span style="border-style: initial; border-color: initial; border-image: initial; outline-style: initial; outline-color: initial; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: transparent">rise of techniques such as machine learning</span> and predictive analytics, combined with human intuition, should only improve our ability to identifiy threats.</p><p style="margin-top: 0px; margin-right: 0px; margin-bottom: 18px; margin-left: 0px; border-style: initial; border-color: initial; border-image: initial; outline-width: 0px; outline-style: initial; outline-color: initial; vertical-align: baseline; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; border-width: 0px; padding: 0px">I couldn’t do my job well if I didn’t truly believe that technology, done right, can solve a lot of the world’s problems. National security is one area where I definitely hope I’m not proven wrong.</p>
<a href='http://techgig.com/tech-news/editors-pick/How-smart-analytics-could-thwart-terrorist-attacks-12379'>View More</a>
Tech News is a blog created by Wasim Akhtar to deliver Technical news with the latest and greatest in the world of technology. We provide content in the form of articles, videos, and product reviews.
Subscribe to:
Post Comments (Atom)
Microsoft 365 (Office) Insider Preview Build 18314.20000 (Version 2412) Released, Here is What’s New and Fixed
UPDATE: Microsoft 365 Insider (previously known as Office Insider) Preview build 18314.20000 (version 2412) is available for download and in...
-
Instead of joining the race to collect the newest and hottest content, Warner Bros . is taking a different approach in its attempt to get a ...
No comments:
Post a Comment
If you have any question please let me know