Pakistanis angry over detentions in Times Sq. case Monday, May 24, 2010
ISLAMABAD – Relatives of three men detained by Pakistan for alleged links to the suspect in the attempted Times Square bombing say the men are innocent.
They
AFP - Thursday, August 6TAIPEI (AFP) - - Taiwan's Beijing-friendly government on Wednesday denied boycotting an Australian film festival amid a row over the e
BERLIN (Reuters) - Chancellor Angela Merkel suffered a double blow on Thursday as a senior party ally in east German
Minister seeks closure of anti-Berlusconi websites Wednesday, December 16, 2009
ROME (AFP) - – The Italian government moved Tuesday to close down Internet sites encouraging further violence against Prime Minister Silvio Berlusconi, who
By ELAINE KURTENBACH,AP Business Writer AP - Wednesday, March 18SHANGHAI - Asia's stock market rally seemed to be running out of steam Wednesday, despite an
Edition:
U.S.
Africa
Arabic
Argentina
Brazil
Canada
China
France
Germany
India
Italy
Japan
Latin America
Mexico
Russia
Spain
United Kingdom
Home
Business
Business Home
Economy
Technology
Media
Small Business
Green Business
Legal
Deals
Earnings
Summits
Business Video
Markets
Markets Home
U.S. Markets
European Markets
Asian Markets
Global Market Data
Indices
M&A
Stocks
Bonds
Currencies
Commodities
Futures
Funds
peHUB
World
World Home
U.S.
Brazil
China
Euro Zone
Japan
Mexico
Russia
Afghan Journal
Africa Journal
India Insight
Global News Journal
Pakistan: Now or Never?
World Video
Politics
Politics Home
Front Row Washington
Politics Video
Technology
Technology Home
MediaFile
Science
Tech Video
Opinion
Opinion Home
Chrystia Freeland
Felix Salmon
Jack Shafer
Breakingviews
George Chen
Bernd Debusmann
Gregg Easterbrook
Nader Mousavizadeh
James Saft
John Wasik
Christopher Whalen
Ian Bremmer
Mohamed El-Erian
Lawrence Summers
The Great Debate
Unstructured Finance
Newsmaker
MuniLand
Money
Money Home
Analyst Research
Global Investing
MuniLand
Reuters Money
Alerts
Watchlist
Portfolio
Stock Screener
Fund Screener
Personal Finance Video
Life & Culture
Health
Sports
Arts
Faithworld
Business Traveler
Left Field
Entertainment
Oddly Enough
Lifestyle Video
Pictures
Pictures Home
Reuters Photographers
Full Focus
Video
Article
Comments (0)
Slideshow
VIDEO
Bringing new energy to bike design
A 22-year old college graduate in New York has adapted hybrid car technology to a bicycle, using a fly-wheel to store energy generated by the brakes for use when the riding gets tough. Maxwell von Stein's flywheel bicycle redistributes energy to help the rider increase speed with maximum efficiency. Video
A look at AT&T's fast Samsung Galaxy S II
Interview with foursquare co-founder, Selvadurai
Black box saves young drivers money
China's "Heavenly Palace" space craft blasts off
Follow Reuters
Facebook
Twitter
RSS
YouTube
Read
Fugitive murder suspect eludes capture in California
30 Sep 2011
Boeing arrest points to U.S. workplace drug problems
30 Sep 2011
Killer of governor of Pakistan's Punjab sentenced to death
9:06am EDT
Ashton Kutcher and Demi Moore Try to Tweet Away Split Rumors
30 Sep 2011
Alibaba's Ma: "very interested" in buying Yahoo
30 Sep 2011
Discussed
64
Herman Cain wins Florida Republican straw poll
65
BofA to introduce $5 monthly debit card fee
63
Business group appeals health law to Supreme Court
Watched
Japan airline apologises for plane flop
Fri, Sep 30 2011
Rihanna's "inappropriate" outfit halts music video
Tue, Sep 27 2011
Plane crashes into ferris wheel
Fri, Sep 30 2011
Government simulates cyber attack for training
Tweet
Share this
Email
Print
Related News
UPDATE 5-Japan cyber attack silence may breach arms contracts
Tue, Sep 20 2011
Japan's defense industry hit by its first cyber attack
Mon, Sep 19 2011
Northrop CEO urges more regulation
Wed, Sep 7 2011
Analysis & Opinion
U.S. should react strongly to Pakistan’s involvement in embassy attack
Who stands for the public in Murdoch vs the government?
Related Topics
Technology »
Cyber Crime »
1 of 5. A cyber security analyst works in a watch and warning center at a Department of Homeland Security cyber security defense lab at the Idaho National Laboratory, September 30, 2011, in Idaho Falls, Idaho.
Credit: Reuters/Jim Urquhart
By Tabassum Zakaria
IDAHO FALLS, Idaho |
Sat Oct 1, 2011 9:18am EDT
IDAHO FALLS, Idaho (Reuters) - The lights went out. Hackers had infiltrated the chemical company's computer network. The firm's own experts ran around from computer to computer trying to fight back and regain control.
"We're flying blind," the chief executive of the fictitious ACME chemical company said.
The cyber attack exercise was part of a weeklong training program that the Department of Homeland Security offers to industries to help them learn how to deal with intrusions into their computer networks.
The exercise is carried out in Idaho Falls where the Department of Homeland Security (DHS) has programs focused on cybersecurity for industries, in partnership with the Idaho National Laboratory, which conducts nuclear research and also has expertise in the technology used by many industries.
The city with a population of about 55,000 is surrounded by potato farms, has an airport with one baggage carousel, and a dairy that still delivers milk to homes.
DHS is concerned about growing cyber threats to industries and conducts the training exercise about once a month. The sessions, aimed at raising awareness about how to deal with a real cyber attack, have been attended by representatives of the energy, oil and gas, and transportation sectors, among others.
What is usually a 12-hour exercise was compressed into two hours in a demonstration for reporters attending a two-day media event that ended Friday.
The scenario was one of industrial espionage. ACME had built a new chemical product and the Barney Advanced Domestic (BAD) Chemical Co was trying to steal its "secret sauce" and disrupt operations to put the competitor out of business.
The BAD hacker penetrated ACME's firewall through a typical "phishing" attack by sending an email to the CEO that said "click here" to go to a website.
When the CEO clicks on the link, malicious software opens a tunnel for the hacker to get into the computer system and find the CEO's password.
The man playing the hacker in real life works for the Idaho National Laboratory where his job has been to hack into its computer systems to discover vulnerabilities.
GAME OF STRATEGY
Each team racks up points and can use them to buy devices either to help protect the network or pierce it.
"This is a game of strategy in how to best implement your defenses in an industrial control environment," said Marty Edwards, director of the DHS Control Systems Security Program. "This isn't all about technology, it's about people."
Some of the most successful teams defending their firm against hackers are the ones that had leaders who delegated responsibilities and had clear policies about how the company would respond if a cyber attack happened, he said.
The ACME CEO, whose actions allowed the hackers into the network in the first place, said he clicked on the emailed link because "it looked like something I should click on, it said click here."
As a result of the breach the chemicals being mixed spilled out of white vats into a metal basin underneath.
Greg Schaffer, a senior official at the DHS National Protection and Programs Directorate, said as adversaries evolve their methods, cybersecurity must also evolve.
"They figure out ways to get around the defenses that you deploy, and because they are changing their methodologies, we need to evolve and change ours on a regular basis. And I don't see that that's going to end," he said.
Schaffer said cybersecurity issues have a lot of focus in the U.S. government and are likely to be less affected by cuts than other parts of the budget.
But, he said, it was important to make sure that areas of the government not focused on cybersecurity as their main mission keep it as a priority when determining cost cuts.
"As budgets becoming tighter, prioritizing taking action for cybersecurity within other parts of the government is something we have to be vigilant about advocating for," he said.
(Editing by Vicki Allen)
Technology
Cyber Crime
Tweet this
Link this
Share this
Digg this
Email
Reprints
We welcome comments that advance the story through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can flag it to our editors by using the report abuse links. Views expressed in the comments do not represent those of Reuters. For more information on our comment policy, see http://blogs.reuters.com/fulldisclosure/2010/09/27/toward-a-more-thoughtful-conversation-on-stories/
Comments (0)
Be the first to comment on reuters.com.
Add yours using the box above.
Social Stream (What's this?)
Edition:
U.S.
Africa
Arabic
Argentina
Brazil
Canada
China
France
Germany
India
Italy
Japan
Latin America
Mexico
Russia
Spain
United Kingdom
Back to top
Reuters.com
Business
Markets
World
Politics
Technology
Opinion
Money
Pictures
Videos
Site Index
Legal
Bankruptcy Law
California Legal
New York Legal
Securities Law
Support & Contact
Contact Us
Advertise With Us
Connect with Reuters
Twitter
Facebook
LinkedIn
RSS
Podcast
Newsletters
Mobile
About
Privacy Policy
Terms of Use
Our Flagship financial information platform incorporating Reuters Insider
An ultra-low latency infrastructure for electronic trading and data distribution
A connected approach to governance, risk and compliance
Our next generation legal research platform
Our global tax workstation
Thomsonreuters.com
About Thomson Reuters
Investor Relations
Careers
Contact Us
Thomson Reuters is the world's largest international multimedia news agency, providing investing news, world news, business news, technology news, headline news, small business news, news alerts, personal finance, stock market, and mutual funds information available on Reuters.com, video, mobile, and interactive television platforms. Thomson Reuters journalists are subject to an Editorial Handbook which requires fair presentation and disclosure of relevant interests.
NYSE and AMEX quotes delayed by at least 20 minutes. Nasdaq delayed by at least 15 minutes. For a complete list of exchanges and delays, please click here.