A botched fix, not legal demands, nixed SCADA security talk

By George V. Hulme, CSO |  Security, SCADA, Siemens

While SCADA security has been of interest in some circles for years, it wasn't until the discovery of the Stuxnet worm that has been claimed to target the SCADA and PLC systems within the infrastructure used by Iran to enrich uranium. Since then, as we covered in the story SCADA security arms race underway, security researchers have been taking a closer look at these systems.

Surprisingly, says Phatak, that despite much of the speculation around a Stuxnet having required significant resources to develop after having witnessed their current research unfold -- he's not convinced that is an accurate assessment. "Our researchers have shown what can be done with about $2,500 in equipment, time, and skill," he says.

George V. Hulme writes about security and technology from his home in Minneapolis. He can be found on Twitter as @georgevhulme.

Read more about network security in CSOonline's Network Security section.


Originally published on CSO |  Click here to read the original story.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Answers - Powered by ITworld

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Ask a Question