• Aucun résultat trouvé

Challenges in Critical Infrastructure Security

N/A
N/A
Protected

Academic year: 2021

Partager "Challenges in Critical Infrastructure Security"

Copied!
2
0
0

Texte intégral

(1)

HAL Id: hal-01529789

https://hal.inria.fr/hal-01529789

Submitted on 31 May 2017

HAL is a multi-disciplinary open access archive for the deposit and dissemination of sci- entific research documents, whether they are pub- lished or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers.

L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignement et de recherche français ou étrangers, des laboratoires publics ou privés.

Distributed under a Creative Commons Attribution| 4.0 International License

Challenges in Critical Infrastructure Security

Corrado Leita

To cite this version:

Corrado Leita. Challenges in Critical Infrastructure Security. 6th International Conference on Au-

tonomous Infrastructure (AIMS), Jun 2012, Luxembourg, Luxembourg. pp.1-1, �10.1007/978-3-642-

30633-4_1�. �hal-01529789�

(2)

Challenges in Critical Infrastructure Security

Corrado Leita

Symantec Research Labs Europe, Sophia Antipolis, France Corrado_Leita@symantec.com

Abstract. The threat landscape is continuously evolving. Large, widespread worm infections are leaving more and more space to more stealthy attacks targeting highly valuable targets. Industrial Control Systems (ICS) are rapidly becoming a new major target of cyber-criminals: ICS are evolving, bringing powerful capabilities into the critical infrastructure environment along with new and yet undiscovered threats.

This was pointed out in multiple occasions by security experts and was confirmed by a recent survey carried out by Symantec: according to the survey (http://bit.ly/bka8UF), 53% of a total of 1580 critical infrastructure industries have admitted to being targeted by cyber attacks. The survey implies that the incidents reported by the press over the last several years are nothing but the tip of a considerably larger problem: the vast majority of these incidents has never been disclosed. Moreover, when looking at the few publicly disclosed incidents such as Stuxnet, we see a completely different level of sophistication, compared to traditional malware witnessed in the wild in previous years.

This talk will dive into the challenges and the opportunities associated to ICS security research, and on the tools at our disposal to improve our ability to protect such critical environments.

Références

Documents relatifs

We decided to ask WHO to find a sponsor and supply oral polio vaccine (OPV) for a national immunization or reimmunization campaign aimed at all children up to 15 months

How a multidisciplinary work in the Marmara Supersite, related to Earthquake induced landslide hazard, was successful carried out.. Seismic risk is the first source of life

L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des

Drawing on a retrospective survey of the careers of PhD graduates from the social science University of Grenoble2 (law, economy, education science, management science,

31 Oct 2012 PICO a - This work was commissioned by the World Health Organization and carried out by The University of California, San Francisco (UCSF), Cochrane Review Group

In steganography 2 , the pirate does not remove watermark signal but detects the presence of hidden data, and the watermarking technique used for it [12].. This suggests criteria

Particularly, in Internet of Things’ lution is kind of an adaptation of ABE to support a distributed applications, we need often efficient mechanisms that ensure access policy among

The main purpose of virtualization technology is to run multiple operating systems on a single physical computer. As multiple OS use the same hardware, it makes possible to