<http://www.gcn.com/cgi-bin/udt/im.display.printable?client.id=gcn_daily&sto
ry.id=44258>
http://www.gcn.com/cgi-bin/udt/im.display.printable?client.id=gcn_daily&stor
y.id=44258 
 

Convergence of physical and IT security is becoming a necessity

05/09/07 -- 11:21 AM 
By William Jackson 

   <http://www.gcn.com/images/clearpixel.gif>
<http://media1.gcn.com/accipiter/adclick/CID=000028f4f10ec1ae00000000/site=g
cn/area=PRINTER_FRIENDLY/pos=BOX_R1/aamsz=336x280/content=/acc_random=814858
/pageid=814858>         
Physical attacks increasingly will be accompanied by cyber attacks that will
magnify the impact of the assault or hamper response, according to analysts
with the U.S. Cyber Consequences Unit. 
   <http://www.gcn.com/images/clearpixel.gif> 
"In the future, we will see that cyber vulnerabilities will determine where
physical attacks will take place," Scott Borg, director and chief economist
of the US-CCU said Wednesday at the GovSec conference being held in
Washington. 
   <http://www.gcn.com/images/clearpixel.gif> 
Combining physical and IT security will be necessary to provide adequate
protection to the nation's critical infrastructure, he said. "Physical
security is becoming utterly dependent on cyber security," Borg said. "And
cyber security is becoming utterly dependent on physical security. Handling
these things separately is not going to be possible for very much longer and
do a good job." 
   <http://www.gcn.com/images/clearpixel.gif> 
The Cyber Consequences Unit is a government-funded independent research
organization that looks at real world vulnerabilities and consequences of
security breaches. Much of the research is done with on-site examinations of
facilities. 
   <http://www.gcn.com/images/clearpixel.gif> 
"We keep finding huge security holes in companies that said they were
compliant with the ISO standards," Borg said. Many of the holes are in areas
that fall between the IT and physical security organizations, or where the
areas overlap and security on one side can be circumvented on the other. 
   <http://www.gcn.com/images/clearpixel.gif> 
Areas of overlap that creat vulnerabilities include IP-enabled surveillance
systems. Many systems have inadequate IT security and can be accessed
through the Internet or through wireless networks, letting an outsider
manipulate the system, said John Bumgarner, US-CCU research director for
security technology. IP-enabled control systems offer another avenue of
attack or manipulation of physical systems, he said. Physical authentication
and access control systems, which often include wireless chip readers, are
vulnerable to interception so that cards and biometric templates can be
copied or spoofed. 
   <http://www.gcn.com/images/clearpixel.gif> 
On the other side of the equation, access to physical facilities can make IT
infrastructure vulnerable. 
   <http://www.gcn.com/images/clearpixel.gif> 
"If you get physical access, you can circumvent all kinds of cyber
security," to launch an attack from the inside, Bork said. 
   <http://www.gcn.com/images/clearpixel.gif> 
How much of this activity is actually happening is difficult to say, because
reports typically lag and this is a relatively new area of study, the
researchers said. But there is a lot of chatter on hacker Web sites and
discussion groups about these techniques. 
   <http://www.gcn.com/images/clearpixel.gif> 
"We've seen a huge amount of intrusions," Borg said. "SCADA systems are
getting a lot more attention than they used to." Data is mostly anecdotal,
but the attacks seem to be in a reconnaissance stage, he said. 
   <http://www.gcn.com/images/clearpixel.gif> 
The emphasis of many hackers, criminals or hostile organizations is not to
take IT systems down, but to subvert or manipulate them, Borg said. 
   <http://www.gcn.com/images/clearpixel.gif> 
"It has been a long time since shutting something down has been a hot topic"
in hacking communities, he said. 


[Non-text portions of this message have been removed]



--------------------------
Want to discuss this topic?  Head on over to our discussion list, [EMAIL 
PROTECTED]
--------------------------
Brooks Isoldi, editor
[EMAIL PROTECTED]

http://www.intellnet.org

  Post message: osint@yahoogroups.com
  Subscribe:    [EMAIL PROTECTED]
  Unsubscribe:  [EMAIL PROTECTED]


*** FAIR USE NOTICE. This message contains copyrighted material whose use has 
not been specifically authorized by the copyright owner. OSINT, as a part of 
The Intelligence Network, is making it available without profit to OSINT 
YahooGroups members who have expressed a prior interest in receiving the 
included information in their efforts to advance the understanding of 
intelligence and law enforcement organizations, their activities, methods, 
techniques, human rights, civil liberties, social justice and other 
intelligence related issues, for non-profit research and educational purposes 
only. We believe that this constitutes a 'fair use' of the copyrighted material 
as provided for in section 107 of the U.S. Copyright Law. If you wish to use 
this copyrighted material for purposes of your own that go beyond 'fair use,' 
you must obtain permission from the copyright owner.
For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml 
Yahoo! Groups Links

<*> To visit your group on the web, go to:
    http://groups.yahoo.com/group/osint/

<*> Your email settings:
    Individual Email | Traditional

<*> To change settings online go to:
    http://groups.yahoo.com/group/osint/join
    (Yahoo! ID required)

<*> To change settings via email:
    mailto:[EMAIL PROTECTED] 
    mailto:[EMAIL PROTECTED]

<*> To unsubscribe from this group, send an email to:
    [EMAIL PROTECTED]

<*> Your use of Yahoo! Groups is subject to:
    http://docs.yahoo.com/info/terms/
 

Reply via email to