Cargando…
Critical infrastructure under attack: lessons from a honeypot
As its name suggests, critical infrastructure is just that – critical. It includes facilities, information, processes and systems upon which our society functions and depends – from energy and our water supply, to transport, election systems and the government. The health sector too is pivotal in su...
Autor principal: | |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Elsevier Ltd.
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7508537/ http://dx.doi.org/10.1016/S1353-4858(20)30106-9 |
_version_ | 1783585441206763520 |
---|---|
author | Barak, Israel |
author_facet | Barak, Israel |
author_sort | Barak, Israel |
collection | PubMed |
description | As its name suggests, critical infrastructure is just that – critical. It includes facilities, information, processes and systems upon which our society functions and depends – from energy and our water supply, to transport, election systems and the government. The health sector too is pivotal in supporting everyday citizens and never has this been clearer than today, in the midst of a pandemic. Critical infrastructure includes facilities, information, processes and systems upon which our society functions and depends. And it is increasingly under attack. To counter this threat, critical infrastructure operators should aim to minimise mean time to response when attacks occur. They also need to gain more visibility into their systems – particularly between the IT and OT environments. And security needs to be an intrinsic element in all OT systems, right from the initial design, argues Israel Barak, Cybereason. |
format | Online Article Text |
id | pubmed-7508537 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | Elsevier Ltd. |
record_format | MEDLINE/PubMed |
spelling | pubmed-75085372020-09-23 Critical infrastructure under attack: lessons from a honeypot Barak, Israel Network Security Feature As its name suggests, critical infrastructure is just that – critical. It includes facilities, information, processes and systems upon which our society functions and depends – from energy and our water supply, to transport, election systems and the government. The health sector too is pivotal in supporting everyday citizens and never has this been clearer than today, in the midst of a pandemic. Critical infrastructure includes facilities, information, processes and systems upon which our society functions and depends. And it is increasingly under attack. To counter this threat, critical infrastructure operators should aim to minimise mean time to response when attacks occur. They also need to gain more visibility into their systems – particularly between the IT and OT environments. And security needs to be an intrinsic element in all OT systems, right from the initial design, argues Israel Barak, Cybereason. Elsevier Ltd. 2020-09 2020-09-22 /pmc/articles/PMC7508537/ http://dx.doi.org/10.1016/S1353-4858(20)30106-9 Text en Copyright © 2020 Elsevier Ltd. All rights reserved. Since January 2020 Elsevier has created a COVID-19 resource centre with free information in English and Mandarin on the novel coronavirus COVID-19. The COVID-19 resource centre is hosted on Elsevier Connect, the company's public news and information website. Elsevier hereby grants permission to make all its COVID-19-related research that is available on the COVID-19 resource centre - including this research content - immediately available in PubMed Central and other publicly funded repositories, such as the WHO COVID database with rights for unrestricted research re-use and analyses in any form or by any means with acknowledgement of the original source. These permissions are granted for free by Elsevier for as long as the COVID-19 resource centre remains active. |
spellingShingle | Feature Barak, Israel Critical infrastructure under attack: lessons from a honeypot |
title | Critical infrastructure under attack: lessons from a honeypot |
title_full | Critical infrastructure under attack: lessons from a honeypot |
title_fullStr | Critical infrastructure under attack: lessons from a honeypot |
title_full_unstemmed | Critical infrastructure under attack: lessons from a honeypot |
title_short | Critical infrastructure under attack: lessons from a honeypot |
title_sort | critical infrastructure under attack: lessons from a honeypot |
topic | Feature |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7508537/ http://dx.doi.org/10.1016/S1353-4858(20)30106-9 |
work_keys_str_mv | AT barakisrael criticalinfrastructureunderattacklessonsfromahoneypot |