• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Structure
  • Schedule
    • First Half of the Semester
      • Week 1: Overview of Course
      • Week 2: TCP/IP and Network Architecture
      • Week 3: Reconnaissance
      • Week 4: Vulnerability scanning
      • Week 5: System and User enumeration
      • Week 6: Sniffers
      • Week 7: NetCat, Hellcat
    • Second Half of the Semester
      • Week 8: Social Engineering, Encoding, and Encryption
      • Week 9: Malware
      • Week 10: Web application hacking, Intercepting Proxies, and URL Editing
      • Week 11: SQL injection
      • Week 12: Web Services
      • Week 13: Evasion Techniques
      • Week 14: Review of all topics and wrap up discussion
  • Assignments
    • Analysis Reports
    • Quizzes & Tests
  • Webex
  • Harvard Coursepack
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackay

IAEA chief: Nuclear power plant was disrupted by cyber attack

October 15, 2016 by Jason A Lindsley 1 Comment

News of another cyber attack on a nuclear power plant surfaced this week, as explained by Yukiya Amano, the director of the International Atomic Energy Agency’s (IAEA).  Amano explained that the attack happened three years ago and was disruptive, however it was not serious because it did not shut down operations.  The article discusses how serious this risk is and the need to take more precautionary measures to improve security in industrial systems.

I used to perform IT Audits of a utilities company, including their antiquated SCADA systems.  Securing these systems is very complex and challenging.  They are built to be available and have a very specific purpose to manage the energy grid.  This often makes patching and currency a major issue and introduces vulnerabilities within the environment that are ripe for exploitation, as we see in this article.

I agree with the director that we need to improve security to our critical infrastructure.  Hopefully, the industry heeds these early warning signs and begins to take significant action to improve security before it’s too late.

http://mobile.reuters.com/article/idUSKCN12A1OC

Filed Under: Week 08: Social Engineering, Encoding and Encryption Tagged With:

Reader Interactions

Comments

  1. Noah J Berson says

    October 18, 2016 at 4:41 pm

    A word that jumped out at me from your post is “antiquated” when describing working with utilities. The more specialized software has to be the fewer options a company has so they often have to pick something that isn’t maintained as often as mass consumer software. A lot of patching has to be done in-house to make sure the system can still work with modern equipment. Patching is a huge expense as that employee modifying the code has to become very specialized in their skills. Increasing budgets for security greatly may be the best fix.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (133)
  • Week 01: Overview (1)
  • Week 02: TCP/IP and Network Architecture (8)
  • Week 03: Reconnaisance (25)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (15)
  • Week 06: Sniffers (9)
  • Week 07: NetCat and HellCat (11)
  • Week 08: Social Engineering, Encoding and Encryption (12)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (12)
  • Week 11: SQL Injection (11)
  • Week 12: Web Services (10)
  • Week 13: Evasion Techniques (7)
  • Week 14: Review of all topics (5)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in