Recently, a computer worm known as STUXNET was able to infiltrate an Iranian nuclear power facility and damage a number of uranium purification centrifuges. This is the first known malware with the ability to cause physical damage to electrical or mechanical devices.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
1. Is Your Data Center Ready for STUXNET?
Eric Gallant
Industry Author & Consultant
Lee Technologies
2. Objectives:
Get you thinking differently about what cyber weapons are capable
of.
Get you thinking differently about the vulnerability of data center
infrastructure.
Provide some first steps you can use to help protect your
facility
3. Agenda:
Discuss the tools and economic impact of cyber attacks.
Show how critical electrical and mechanical infrastructure became
vulnerable.
Discuss who would want to attack a data center and why.
Discuss solutions and recommendations.
4. Weapons of Cyber attackers
Malware
Viruses, Worms, Trojan Horses, Spyware, Adware, Tracking programs,
Bots
Hackers
Identity Theft, Spear-phishing, Data Theft, Denial of Service
Attacks (DoS, DDoS), Espionage, Sabotage
These weapons are constantly evolving, endlessly creative and
increasingly potent.
5. Proliferation & Cost of Cyber Attacks
According to Symantec in 2008 The rate of malware creation exceeds
the rate of legitimate software
In a 2009 speech President Obama said, It's been estimated that
last year alone cyber criminals stole intellectual property from
businesses worldwide worth up to $1 trillion.
Between 1995 and 2000 cost of cyber attacks to worldwide business
rose from $500M to $17B
6. Physical Infrastructure Vulnerability
For data centers defending against cyber attacks is a nightmare for
IT but not usually an issue for FACILITIES.
That dynamic is rapidly changing
Electrical and mechanical infrastructure has become vulnerable
to catastrophic physical damage from hackers and malware.