How Informatics Help in Security of Technical Systems

Only available on StudyMode
  • Download(s) : 1068
  • Published : May 1, 2013
Open Document
Text Preview
THE IMPORTANCE OF INFORMATICS FOR THE SECUITY OF TECHNICAL SYSTEMS

Even though it is fun and practical, Information Technology gives us new challenges in security, because the security threats also adapt their shape. In the past, securing vital objects means keeping their physical attributes intact, but this is not the case now. Currently, we should also be concerned about the security of its digital format or access, and Informatics certainly plays a vital role in this area. Nowadays informatics has totally changed our approach to security of technical systems. Impending Threats increased by eminence use of SCADA and rapid growth of telecommunication and computer systems connect previously isolated technical systems. SCADA have indirect threats like viruses and operational errors that can be get rid of by toil in Informatics only.

A recent example of targeting a specific industrial control system likely in Iran by computer worm ‘Stuxnet’ is eyes opener for security of the technical systems. Stuxnet was a threat that was primarily written to target an industrial control system or set of similar systems. It was affecting more than 50,000 IP address in Iran, and forced Iranian government to replace more than 1000 centrifuges from their nuclear facilities. The interesting part of Stuxnet is that this malware did not attempt to steal or collect people credentials but it was built only for one big purpose that is to infect, spy, and disrupt the performance of certain unique machines. Researchers have been discovering new malwares and worms timely that were intensifying the threats to the technical systems, like Duqu have sought to infiltrate networks in order to steal data. This new threat appears not to cause physical damage, but to collect huge amounts of sensitive information. Kaspersky's first recorded instance of Flame was in August 2010.According to them Once a system is infected, Flame begins a complex set of operations, including sniffing the network...
tracking img