ALL >> Computers >> View Article
Isu Internet Security Researchers Combat Cyber-attacks

The surge in cyber-attacks over the last year, use of cyber weapon such as Stuxnet on industrial installations and leakage of classified documents by WikiLeaks has made it inevitable for Internet security researchers to find new ways to deal with the challenges in the cyberspace. With the emergence of alleged state-sponsored cyber-attacks on rival countries has brought information warfare to the center stage. Information security has become a challenge for Governments worldwide. Countries have started revamping their IT security infrastructure to deal with threats of cybercrime, cyber espionage and cyber-attacks. Security researchers at Iowa State University are developing cyber-attacks to devise resistance and counter-offensive mechanisms. The research is being conducted by a group of electrical and computer engineering students of the University.
The researchers have created a test bed for Supervisory Control and Data Acquisition (SCADA) systems, which are used to monitor and control industrial installations. Through the test researchers endeavor to simulate a real-time cyber-attack scenario. The test may help the ...
... researchers in assessing and analyzing the risks involved and devising protection mechanisms to safeguard critical national installations. The research has been partly sponsored by National Science foundation.
Information security professionals have been alerting the governments on the likely implication of a cyber-attack on crucial government, utility and military installations. Attackers may not only intrude into networks and gain access to privileged information but may also cause of denial-of-service attacks to disrupt operations. Advancements in technology have facilitated automation of operations at crucial installations such as power stations. However, automation has also made them vulnerable to cyber-attacks. A cyber-attack on a power grid may completely disrupt power supply creating chaos among people. An attack on telecommunications infrastructure may lead to complete breakdown of communications and severely impact business operations. Realizing the dangers of cyber warfare, many countries are establishing cyber commands to safeguard crucial industrial and infrastructural facilities.
The researchers are studying the implications of distributed denial-of-service attacks and intrusion attempts by hackers to corrupt or delete data. Little has been done to protect critical installations of private business organizations. Business organizations must regularly assess the threats by conducting security audits, ethical hacking and devise mechanisms to protect their systems and networks against all forms of cyber-attacks.
Add Comment
Computers Articles
1. Looking For A Tableau Replacement? Try Helical Insight – Open Source Bi ToolAuthor: Vhelical
2. Accidentally Deleted Files From Your Hard Drive? Here’s What To Do Next
Author: f2.technology
3. Optimizing Manufacturing With Intelligent Online Production Planning
Author: Logitrac360
4. Extract Food App Review Data For Customer Sentiment
Author: Food Data Scrape
5. How Can Korean Naver Window Scraping Help You Analyze Korean Product Trends?
Author: Mobile App Scraping
6. Web Scraping Organic Vs Paid Listings On Food Apps
Author: Food Data Scrape
7. The Real Cost Of Ignoring Paid Marketing
Author: Nodesure Technologies Pvt Ltd
8. The Ultimate Guide To Height Safety Training In Melbourne
Author: Train Now
9. Why Helical Insight Is The Leading Open Source Business Analytics Tool
Author: Vhelical
10. Reliable Humidity Monitor And Refrigerator Alerting Solutions From Tempgenius For Critical Environments
Author: Chris Miller
11. Discover The Best Lenovo Store And Dell Showroom In Mumbai For Quality Tech
Author: Prachi Grey
12. Revolutionizing Data Reports The Rise Of Open Source Chat-based Reporting Tools
Author: Vhelical
13. Ultimate Guide To Doctor App Development
Author: EMed
14. How To Ensure Accurate Naver Blog Data Scraping On Android And Ios Devices?
Author: Mobile App Scraping
15. Powering Connectivity: Modern Networking Solutions
Author: Trinity Diaz