“To me, the most terrifying form of warfare would be if there was some simultaneous cyber attack on our grid, on the banking system, and on our transportation system. That would be quite a devastating thing, and yet in theory, absent some real protective measures, that could happen.” – Wilbur Ross , U.S. Secretary of Commerce, Senate Commerce, Science and Transportation Committee, Confirmation Hearings, 1/17/2017Two Tools to Mitigate Cyber Threats
Cybersecurity SITRP
Recently, U.S. prosecutors have charged three Chinese "citizens" from Guangzhou with hacking into various businesses (Siemans, Moody's, etc.) to steal their secrets. The indictments were handed down in Federal court in Pittsburgh regarding attacks for the past six years. (Click here for details.)
Unfortunately, the most common image of a hacker is the one created by Hollywood...usually a smart, gifted if lonely teen in his bedroom with a hankering to explore the deep recesses of the Web. (Think of Matthew Broderick in the movie WarGames.)
For
example, the Communist Chinese Party (CCP) has entire divisions in their military
devoted to hacking, discovering and exploiting American infrastructure vulnerabilities.
The
Red Chinese learned decades ago it was easier to steal American technology
advances to accelerate their economic development in a spectacularly rapid
pace.
What is to be Done
Who Handles the Hackers — Private Sector
Organizations
|
Description
|
CyberSecure IPS
|
Provides protection against
critical infrastructure intrusion attempts and dispatches first response
teams in real-time.
|
Palo Alto Software
|
Software prevention to reduce cybersecurity risk to a
manageable degree.
|
Advanced Persistent Threat (APT) Groups and
Operations
|
The sheet is maintained by a select group of editors
and includes data of APT activity (by China, Russia, Iran, North Korea, etc.),
their tools, operations, and targets.
|
FireHOL IP Lists
|
Analyzes security IP feeds to identify cybercrime and
malware trends and data analytic tools to track unique IPs.
|
IBM X-Force Exchange
|
Exchange threat platform (malicious IP addresses, botnet
distributions) with a security intelligence blog and forum for responders to
post information on common vulnerabilities.
|
Malware Check
|
Monitors URLs for suspicious malware, virus, worm,
phishing and other activity by a search engine.
|
MalwareTech Botnet Tracker
|
Tracks active botnets by looking at their type,
geographic distribution, and unique IPs on a live map that displays every
incident and type that has occurred in the past 5 minutes.
|
Phishtank
|
Current, community based tracking of domains
connected to phishing attacks along with downloadable databases.
|
SysAdmin, Audit, Network and Security (SANS) Institute Internet Storm Center
|
Offers data and analysis on future threat hunting trends and malware threats
|
Who Handles the Hackers - Government
Organization
|
Description
|
Electricity Subsector
Coordinating Council
(ESCC)
|
The ESCC serves as the principal liaison between the
federal government and the electric power sector, with the mission of
coordinating efforts to prepare for national-level incidents or threats to
critical infrastructure.
|
The National Cybersecurity and
Communications Integration Center
(NCCIC)
|
Part of the Department of Homeland Security that
would act as the central command point where the government collects and
analyzes data on the impact of any hacker attack on the power grid.
|
Department of Homeland Security (DHS) AIS (Automated
Indicator Sharing)
|
Automated indicator sharing to help government and
private sector entities exchange info on threat indicators.
|
Supervisory Control and Data
Acquisition Systems
(SCADA)
|
Software used by manufacturers, nuclear plant
operators and pipeline operators to monitor variables to monitor and diagnose
unexpected problems, such as a hacker attack.
|
The United States House
Permanent Select Committee
on Intelligence (HPSCI)
https://intelligence.house.
gov/cyber/
|
Cyber criminals, often supported by hostile
governments, are increasing their attacks on U.S. networks and American
businesses. The HPSCI acts to mitigate this growing problem.
|
The National Security
Agency (NSA)
|
Part of the
U.S, DOD, under the authority of the Director of National Intelligence, that
protect U.S. Communications networks and IT systems.
|
The North American
Electric Reliability Corporation (NERC) https://www.ferc.gov/industries/ electric/indus-act/reliability/cybersecurity.asp
|
Regulatory authority that assures the reliability and
security of the bulk power system in North America.
|
U.S. Security and
Exchanges Commission (SEC)
|
Identifies and manages cybersecurity risks and ensures
that market participants — including issuers, intermediaries, investors and
government authorities.
|
National Institute of
Science and Technology (NIST)
|
Practical, innovative security technologies and
methodologies that enhance the country’s ability to address current and
future computer and information security.
|
Fortunately, everyday there are highly gifted, very creative, and extremely skilled American cybersecurity and engineering experts manning the protective firewalls of the cloud and network-based data systems in this nation.
For more information, see https://www.washingtontimes.com/news/2017/dec/28/electric-power-research-institute-wrong-about-powe/
And here.



.jpg)
.jpg)


















