Even if an industrial network is tightly air gapped, it is still vulnerable to potential threats from accidental or intentional damage from internal sources. The only way to control this internal attack vector is by continuously monitoring the network and by implementing rigid access control mechanisms.
An old saw in cybersecurity circles contends that hackers hack for three reasons: to make a mess, to make money, or to make war. In reality, the situation is slightly more complex. According to a new report from Frost and Sullivan, cyber threats come in the form of people, organizations, and
Traditionally, IT and OT have been two different silos, each operating in its own environment. However, with companies pursuing increased operational efficiencies and profit margins, the convergence of IT and OT is inevitable. A converged IT-OT scenario will often drive the initiative for implementing industrial cyber protection.
Every organization must carefully assess and identify vulnerabilities through which black hats can potentially infiltrate the system. Cyber-attacks are triggered by several sources such as competition, political rivalry, and hostile employees who want to disrupt the plant operations. The most dangerous trigger, however, is state-sponsored attacks, which can have an environmental impact and are specifically intended to create destruction on a massive scale.
Critical infrastructure such as power grids
Even though attacks are spread across the manufacturing industry, data suggests that energy organizations are more prone to these attacks, which have become more sophisticated over the years. At least 75% of companies in the oil and gas and power sectors have experienced one or more successful attacks in the past year. More than 15% of cyber-attacks come from the energy sector. In the past, the energy sector has been targeted in the form of attacks such as Stuxnet, Duqu, Shamoon, and Night Dragon.
Want to learn more about attack motives and how to take strides towards a secure industrial infrastructure? Download our Essential Guide to Cyber Security in the Era of IIoT.
Bayshore Networks® is a registered trademark. The Bayshore Networks logo, Industrial-Strength Cybersecurity™, Enable IT/OT Convergence Safely and Securely™, Enable the Industrial IoT Safely and Securely™, Bayshore IT/OT Gateway™, Bayshore IC™, Bayshore SE™, Bayshore SingleView™, Bayshore SingleKey™, Bayshore SCADA Firewall™ and Bayshore Pallaton™ are trademarks of Bayshore Networks, Inc. All other trademarks on this website are the properties of their respective owners. Copyright © Bayshore Networks 2019.