Amazines Free Article Archive
www.amazines.com - Thursday, September 26, 2024
Read about the most recent changes and happenings at Amazines.com
Log into your account or register as a new author. Start submitting your articles right now!
Search our database for articles.
Subscribe to receive articles emailed straight to your email account. You may choose multiple categories.
View our newest articles submitted by our authors.
View our most top rated articles rated by our visitors.
* Please note that this is NOT the ARTICLE manager
Add a new EZINE, or manage your EZINE submission.
Add fresh, free web content to your site such as newest articles, web tools, and quotes with a single piece of code!
Home What's New? Submit/Manage Articles Latest Posts Top Rated Article Search
Google
Subscriptions Manage Ezines
CATEGORIES
 Article Archive
 Advertising (133574)
 Advice (161671)
 Affiliate Programs (34799)
 Art and Culture (73857)
 Automotive (145715)
 Blogs (75618)
 Boating (9851)
 Books (17223)
 Buddhism (4130)
 Business (1330760)
 Business News (426453)
 Business Opportunities (366519)
 Camping (10973)
 Career (72796)
 Christianity (15848)
 Collecting (11638)
 Communication (115089)
 Computers (241958)
 Construction (38964)
 Consumer (49954)
 Cooking (17080)
 Copywriting (6733)
 Crafts (18203)
 Cuisine (7549)
 Current Affairs (20321)
 Dating (45908)
 EBooks (19703)
 E-Commerce (48267)
 Education (185529)
 Electronics (83525)
 Email (6438)
 Entertainment (159859)
 Environment (28987)
 Ezine (3040)
 Ezine Publishing (5454)
 Ezine Sites (1551)
 Family & Parenting (111009)
 Fashion & Cosmetics (196613)
 Female Entrepreneurs (11853)
 Feng Shui (134)
 Finance & Investment (310616)
 Fitness (106481)
 Food & Beverages (63056)
 Free Web Resources (7941)
 Gambling (30227)
 Gardening (25202)
 Government (10519)
 Health (630151)
 Hinduism (2206)
 Hobbies (44083)
 Home Business (91704)
 Home Improvement (251222)
 Home Repair (46250)
 Humor (4725)
 Import - Export (5459)
 Insurance (45104)
 Interior Design (29616)
 International Property (3488)
 Internet (191026)
 Internet Marketing (146688)
 Investment (22861)
 Islam (1161)
 Judaism (1352)
 Law (80500)
 Link Popularity (4596)
 Manufacturing (20919)
 Marketing (99321)
 MLM (14140)
 Motivation (18234)
 Music (27000)
 New to the Internet (9498)
 Non-Profit Organizations (4048)
 Online Shopping (129734)
 Organizing (7813)
 Party Ideas (11855)
 Pets (38165)
 Poetry (2229)
 Press Release (12691)
 Public Speaking (5643)
 Publishing (7566)
 Quotes (2407)
 Real Estate (126773)
 Recreation & Leisure (95495)
 Relationships (87675)
 Research (16182)
 Sales (80353)
 Science & Technology (110298)
 Search Engines (23515)
 Self Improvement (153307)
 Seniors (6220)
 Sexuality (36012)
 Small Business (49316)
 Software (83049)
 Spiritual (23517)
 Sports (116155)
 Tax (7664)
 Telecommuting (34070)
 Travel & Tourism (308278)
 UK Property Investment (3123)
 Video Games (13382)
 Web Traffic (11793)
 Website Design (56941)
 Website Promotion (36665)
 World News (1000+)
 Writing (35842)
Author Spotlight
RAM SEWAK

Myself Ram Sewak possessing indepth domain experience of more than 10 years in SEO, SEM, Web Develop...more
DAVID PAYNE

Technology without a doubt has made things easier for us. However, that being said, it has also comp...more
AREESH ISHTIAQ

Areesh Ishtiaq a Top Rated SEO and Digital Marketing Guru on Upwork, working as a project manager fo...more
CHERYL PETERSEN

">Cheryl Petersen revised and updated Mary Baker Eddy's Science and Health with Key to the Scripture...more
RAJESH THAPALIYA

I am in Nepalest tourism industery working since 2000 as a trekking porter to the senior tour leader...more


Exclusive: cyberattacks on us natural-gas pipeline companies,evidence points to china by efvf thbtn





Article Author Biography
Exclusive: cyberattacks on us natural-gas pipeline companies,evidence points to china by
Article Posted: 11/05/2012
Article Views: 57
Articles Written: 1207
Word Count: 1111
Article Votes: 0
AddThis Social Bookmark Button

Exclusive: cyberattacks on us natural-gas pipeline companies,evidence points to china


 
Business,Business News,Business Opportunities
Along with the alerts, DHS supplied the pipeline industry and itssecurity experts with digital signatures, or "indicators ofcompromise" (IOCs). Those indicators included computer filenames, computer IP addresses, domain names, and other keyinformation associated with the cyberspies, which companies coulduse to check their networks for signs they ve been infiltrated. Two independent analyses have found that the IOCs identified by DHSare identical to many IOCs in the attack on RSA, the Monitor haslearned. RSA is the computer security division of EMC , a Hopkinton, Mass. , data storage company.



Discovery of the apparent link between the gas-pipeline and RSAhackers was first made last month by Critical Intelligence, acybersecurity firm in Idaho Falls , Idaho . The unpublished findings were separately confirmed this week byRed Tiger Security, based in Houston . Both companies specialize in securing computerized industrialcontrol systems used to throw switches, close valves, and operatefactory machinery. "The indicators DHS provided to hunt for the gas-pipelineattackers included several that, when we checked them, turned outto be related to those used by the perpetrators of the RSAattack," says Robert Huber, co-founder of CriticalIntelligence. "While this isn't conclusive proof of aconnection, it makes it highly likely that the same actor wasinvolved in both intrusions." Mr.



Huber would not release details about the indicators, becauseaccess is restricted by DHS. Jonathan Pollet, founder of Red Tiger Security, has arrived atsimilar conclusions. "The indicators from each source are a match," says Mr.Pollet, whose company has extensive experience in the oil and gasindustry. "This does not directly attribute them to the samethreat actor, but it shows that the signatures of the attack wereextremely similar.



This is either the same threat actor, or the twothreat actors are using the same command and control' serversthat control and manage the infected machines." Among several DHS indicators with links to the RSA campaign, Hubersays, is an Internet "domain name" a humanlyrecognizable name for a computer or network of computers connectedto the Internet. Scores of computer-server "hosts"associated with that domain were already known to have participatedin the RSA attack, Critical Intelligence found. Alone, the domain-name finding was strongly suggestive. But alongwith many other indicators he's checked, a link between the RSA andpipeline-company attacks is clear, Huber says. "I don't think there's much question that the attackers goingafter the pipelines are somehow connected to the group that wentafter RSA," he says.



So who went after RSA? Gen. Keith Alexander , chief of US Cyber Command , who also heads the NSA, told a Senate committee in March thatChina was to blame for the RSA hack in March 2011. The infiltration of RSA by cyberspies is widely considered one ofthe most serious cyberespionage attacks to date on a nondefenseindustry company. Its SecurID system helps to secure many defensecompanies, government agencies, and banks. Information stolen fromRSA has since been reported to have been used in attacks againstdefense companies Lockheed Martin , Northrop Grumman , and L-3 Communications.



Cyberspies attacked RSA using a spear-phishing e-mail thatcontained an Excel spreadsheet with an embedded malicious insert. Similarly, the gas-pipelineattacks have seen spear-phishing e-mails with an attachment ortainted link. Nothing in cyberespionage is for sure, Huber and Pollet say especially since identifying perpetrators is difficult or sometimesimpossible because of the layers of digital obfuscation that spossible for attackers. But as other security firms check andconfirm the findings, it could reveal important things, the twoexperts agree. First, it would show that the same group hacking the gas-pipelinecompanies is also interested in high-tech companies that have afocus on cryptography and cybersecurity.



Second, the question arises: Why did DHS provide the indicators tothe industry, but didn t identify the apparent link between thegas-pipeline and RSA attacks? Finally, there's also the question of why DHS officials, in theiralerts, requested companies that detected the intruders to onlyobserve them and report back to DHS but not act to remove orblock them from their networks. Some speculate that blocking theintruders would have short-circuited intelligence gathering. (A DHSspokesman refused comment on the issue.) This last point has raised consternation among security personnelat some pipeline companies. For a year now, big cybersecuritycompanies like McAfee have had digital defenses that could bedeployed against the RSA hack. In fact, they might have been atleast partially effective against the new pipeline hack, Hubersays.



Has DHS s advice to only observe the intruders come at the expenseof allowing the cyberspies to become more deeply embedded oncompany networks? Marty Edwards, director of the DHS Control Systems SecurityProgram, which issued the alerts, referred questions topublic-affairs officials. DHS s Industrial Control Systems Cyber Emergency Response Team[ICS-CERT] has been working since March 2012 with criticalinfrastructure owners and operators in the oil and natural gassector to address a series of cyber intrusions targeting naturalgas pipeline companies," Peter Boogaard, a DHS spokesman, saidin an e-mailed statement. "The cyber intrusion involves sophisticated spear-phishingactivities targeting personnel within the private companies,"he continued. "DHS is coordinating with the FBI and appropriate federal agencies, and ICS-CERT is working withaffected organizations to prepare mitigation plans customized totheir current network and security configurations to detect,mitigate and prevent such threats. But if anything, questions are growing about China's role eitherdirectly or through its cyber militia in vacuuming up proprietary,competitive data on US corporate networks as well as possiblymapping critical infrastructure networks.



Sen. Carl Levin (D) of Michigan queried Alexander about "China's aggressive and relentlessindustrial espionage campaign through cyberspace" and askedhim to provide some unclassified examples. Alexander's first namedexample was RSA. "We are seeing a great deal of DOD -related equipment stolen by the Chinese," he replied.



"Ican't go into the specifics here, but we do see that from defenseindustrial companies throughout. There are some very public ones,though, that give you a good idea of what's going on. The mostrecent one, I think, was the RSA exploits." "The exploiters," he continued, "took many of thosecertifications and underlying software" from RSA, renderingthe security system insecure until updated. Chinese officials regularly pour cold water on such accusations. APentagon press conference on Monday with Defense Secretary Leon Panetta and Chinese Defense Minister Gen.



Liang Guanglie was intended to show US-Chinese cooperation on cybersecurity. ButLiang took the opportunity to condemn claims that Chinesecyberspies are the predominant actors in cyberspying on USnetworks. "I can hardly agree with [that] proposition," said Liang,as reported by The Hill's DefCon blog. "During the meeting,Secretary Panetta also agreed on my point that we cannot attributeall the cyberattacks in the United States to China.".

I am an expert from Auto Electronics, usually analyzes all kind of industries situation, such as flexible braided hose , flexible vacuum hose.

Related Articles - flexible braided hose, flexible vacuum hose,

Email this Article to a Friend!

Receive Articles like this one direct to your email box!
Subscribe for free today!

 Rate This Article  
Completely useless, should be removed from directory.
Minimal useful information.
Decent and informative.
Great article, very informative and helpful.
A 'Must Read'.

 

Do you Agree or Disagree? Have a Comment? POST IT!

 Reader Opinions 
Submit your comments and they will be posted here.
Make this comment or to the Author only:
Name:
Email:
*Your email will NOT be posted. This is for administrative purposes only.
Comments: *Your Comments WILL be posted to the AUTHOR ONLY if you select PRIVATE and to this PUBLIC PAGE if you select PUBLIC, so write accordingly.
 
Please enter the code in the image:



 Author Login 
LOGIN
Register for Author Account

 

Advertiser Login

 

ADVERTISE HERE NOW!
   Limited Time $60 Offer!
   90  Days-1.5 Million Views  

 

Great Paranormal Romance


TIM FAY

After 60-plus years of living, I am just trying to pass down some of the information that I have lea...more
GENE MYERS

Author of four books and two screenplays; frequent magazine contributor. I have four other books "in...more
DONNIE LEWIS

I'm an avid consumer of a smoothie a day living, herbs, vitamins and daily dose of exercise. I'm 60...more
ADRIAN JOELE

I have been involved in nutrition and weight management for over 12 years and I like to share my kn...more
STEVERT MCKENZIE

Stevert Mckenzie, Travel Enthusiast. ...more
LAURA JEEVES

At LeadGenerators, we specialise in content-led Online Marketing Strategies for our clients in the t...more
SUSAN FRIESEN

Located in the lower mainland of B.C., Susan Friesen is a visionary brand strategist, entrepreneur, ...more
STEPHEN BYE

Steve Bye is currently a fiction writer, who published his first novel, ‘Looking Forward Through the...more
STEVE BURGESS

Steve Burgess is a freelance technology writer, a practicing computer forensics specialist as the pr...more
ALEX BELSEY

I am the editor of QUAY Magazine, a B2B publication based in the South West of the UK. I am also the...more

HomeLinksAbout UsContact UsTerms of UsePrivacy PolicyFAQResources
Copyright © 2024, All rights reserved.
Some pages may contain portions of text relating to certain topics obtained from wikipedia.org under the GNU FDL license