In the 2007 film, "Live Free or Die Hard," Bruce Willis as New York City Police Detective John McClane stops the villain who has sabotaged the U.S.'s network of traffic signals, rail transport and air traffic control. The villain also has forced the evacuation of numerous federal buildings with a false anthrax alarm, with some of his men infiltrating a Maryland facility by posing as a hazmat cleanup team to sneak in and kill the guards.
This scenario is no longer fiction. In its Jan.-April 2014 issue of the ICS-CERT Monitor, the U.S. Department of Homeland Security (DHS) confirmed that a public utility was compromised when a "sophisticated threat actor" gained unauthorized access to its control system network, demonstrating that fictional attacks have become all too real. After notification of the incident, ICS-CERT (Industrial Control Systems Cyber Emergency Response Team), an agency within DHS, validated that the software used to administer the control system assets was accessible via Internet facing hosts.
These attacks will become more common, says Ben Beeson, vice president for Cyber Security and Privacy at Lockton Companies, based in Washington, D.C. They are also likely to become more significant and destructive. Companies need to understand that their physical assets also are at risk, not just their data, he adds.
Want to continue reading?
Become a Free PropertyCasualty360 Digital Reader
Your access to unlimited PropertyCasualty360 content isn’t changing.
Once you are an ALM digital member, you’ll receive:
- Breaking insurance news and analysis, on-site and via our newsletters and custom alerts
- Weekly Insurance Speak podcast featuring exclusive interviews with industry leaders
- Educational webcasts, white papers, and ebooks from industry thought leaders
- Critical converage of the employee benefits and financial advisory markets on our other ALM sites, BenefitsPRO and ThinkAdvisor
Already have an account? Sign In Now
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.