Quote:
Originally Posted by Osem
Well ultimately that'd be the response yes. I do have concerns about possible foreign interference with the likes of nuclear power stations but cyber attacks don't require ownership even if the technology being supplied could presumably have 'backdoors' which could be exploited by a disgruntled foreign power.
|
You have to remember that industrial networks and control systems are rarely connected to the internet and never directly for obvious reasons and use different protocols to normal net traffic: Commonly Modbus, Fieldbus and Profibus. There are also stand-alone "policemen" on critical control systems that are not networked.
Whilst we do program in "backdoors" they're mainly for rescuing customers who have put in some weird setup and locked themselves out. They usually relay on actual physical access to the instrument.
The most famous malicious program is
Stuxnet but that exploited Windows vulnerability and Siemens Programmable Logic Controlers.
__________________
History is much like an endless waltz: The three beats of war, peace and revolution continue on forever.
However history will change with my coronation - Mariemaia Khushrenada