According to information technology security audit specialists, the U.S. government has taken unprecedented action to counter attacks on the country’s electrical infrastructure. Donald Trump’s administration has decided to implement “retro technology” after recent attempts at cyberattacks, allegedly originating from Russia.
Governments around the world have entered a race against the clock to secure the industrial control systems that manage the distribution of electricity. The main drawback is that these systems were not designed with the cybersecurity variable, as the ability to connect to the Internet was not thought of.
Information technology security audit specialists say that, taking advantage of this factor, the U.S. government designed its new approach to power grid cybersecurity: by incorporating new technologies and updated procedures, it will be implemented analogous and manual techniques for isolating critical network control systems. This will significantly mitigate the risk of cyberattacks that result in massive power outages or service failures.
“The work of hackers, even those threat actors with the most sophisticated methods and tools, will be hampered by the need to physically access our most critical infrastructure, greatly increasing the complexity of any cyberattack attempt”, says a U.S. government press release recently published.
The U.S. Senate has just passed the so called Securing Energy Infrastructure Act (SEIA). The bill was originally introduced in 2016 by Senators Angus King, an independent senator for the state of Maine, and Jim Risch, senator of the Idaho Republican Party.
Information technology security audit experts from the International Institute of Cyber Security (IICS) say that cyberattacks on the electrical infrastructure of various countries have increased its rate recently. Perhaps the most well-known case is the incident brought about by Russian intelligence agencies on Ukraine’s power grids, in which malware was injected capable of crippled the supply of electricity to multiple areas of the country.
He is a well-known expert in mobile security and malware analysis. He studied Computer Science at NYU and started working as a cyber security analyst in 2003. He is actively working as an anti-malware expert. He also worked for security companies like Kaspersky Lab. His everyday job includes researching about new malware and cyber security incidents. Also he has deep level of knowledge in mobile security and mobile vulnerabilities.