The cyber security attack on Friday has highlighted the vulnerability of UK national infrastructure to malicious cyber threats. So far it is the impact on the NHS that has hit the headlines. But it could be far worse: what if it were our nuclear power plants that were disrupted? Next week- from 22 to 24 May – the Vienna –based World Institute for Nuclear Security (WINS) , headed by the former head of security at Sellafield, Dr Roger Howsley, is participating in the 2nd Annual Industrial Control Cyber Security Nuclear Summit, in Warrington, organised by Cyber Senate entitled with an important presentation entitled“Transformation, Preparedness and Developing Cyber Security Assurance”. It is instructive to listen to the words of Russian cyber security expert, Eugene Kasperksy, founder and ceo of the Moscow-based Kasperksy Labs, warns governments engaged in cyber warfare that “everything you do – it’s a boomerang: it will get back to you.” Four years ago he warned that Russian nuclear power plant infected by Stuxnet malware programme – widely believed to have been created by the US and Israel – had infected a Russian nuclear power plant, Speaking at the Canberra Press Club 2013 in Australia’s capital city. Kasperksy recounted a story from “the Stuxnet time” when a friend of his working in an unnamed nuclear power plant reported that the plant’s computers were “badly infected by Stuxnet”. Kaspersky criticized government departments responsible for engineering cyber-attacks, The Stuxnet virus was first discovered in June 2010 and was found to specifically target industrial control systems manufactured by Siemens. The initial target of the virus is widely thought to have been the centrifuges used in Iran’s uranium enrichment programme. Although the goal of the virus was extremely specific, its method of proliferation was indiscriminate and the code has since been found on computers across the world.
David Lowry’s Blog 15th May 2017 read more »