Radiflow releases 'SCADA Attackers Taxonomy and Analysis' whitepaper

January 23, 2019 – Radiflow, a provider of industrial cybersecurity solutions for critical infrastructure, announced that the company is presenting a new approach for classifying the attack characteristics and assessing attack vulnerabilities on OT networks in a recently published whitepaper titled Meet Your Attacker: SCADA Attackers Taxonomy and Analysis.
In the company’s whitepaper, Radiflow explains that while the reporting on cybersecurity incidents and attack campaigns is on the rise, each reporting organization uses a different analysis methodology.
For example, the cyberattack in the power grid in Ukraine in 2015 was covered by over 30 research centers around the world with each using its own methodology and publishing biased conclusions influenced by the researcher’s knowledge and the organization’s point of view.
“The increase in the number of reports, each with a different analysis methodology, makes it challenging for security analysts to derive coherent and clear conclusions from the cases,” explained Yehonatan Kfir, CTO of Radiflow and the author of this whitepaper. “The current lack of a single taxonomy to analyze security incidents leads to difficulties in understanding the threat landscape in an unbiased way.”
In the whitepaper, Radiflow analyzes several highly publicized cybersecurity incidents over the past ten years, including the Triton and the Ukraine electricity blackout cases, and puts forward a new evidence-based taxonomy for classifying and analyzing the impact of each on OT networks.
According to Radiflow, the next evolutional step in risk analysis for critical infrastructure operators and industrial enterprises is dynamically determining the impact of disclosed vulnerabilities. The company advocates that this should be done based on the context of the organization’s OT network and business logic related to the relevant attacker models.
“Here too there are issues with the existing methods as the two major vulnerability disclosure organizations – NIST and ICS-CERT – use scoring standards for the risk assessment of disclosed vulnerabilities with a bias towards IT networks, specifically the potential of a vulnerability to compromise sensitive data and cause non-compliance with regulations,” stated Kfir. “Even though these two organizations do not always agree on the impact of a disclosed vulnerability, this framework is clearly a good fit for corporate IT networks, although is not always applicable to the context of industrial environments and the SCADA and ICS systems running on OT networks.”

Check out our free e-newsletters
to read more great articles.
MORE RESOURCES
-
Softomotive announces Softomotive’s RPA Academy online learning portal
The Softomotive Academy is designed to improve the employability quotient of professionals and developers. It provides them with the opportunity to...
-
Frost & Sullivan Report: Big Data technology driving proactive cybersecurity solutions
Frost & Sullivan’s recent analysis, Envisioning the Next-Generation Cybersecurity Practices, presents an overview of cybersecurity in enterprises...
-
Cyber Florida announces of Cyber Defense for SMBs resource
With input from experts in academia, private industry, government, and the military, this guide offers guidance to help SMBs identify the most...
-
Cressall releases enclosure design infographic
The guide aims to support design engineers as well as resistor end users across all industries to understand the requirements of their power...
-
Ponemon Institute releases study on Managing Safety, Security and Privacy in the Interconnected...
The purpose of this study is to understand the concerns that organizations have for functional safety, cybersecurity and data privacy when there is...
RELATED
-
Manufacturing Automation - Inside Universal Robots Efforts to Empower the Small/Medium Enterprise
By Bill Lydon, Editor, Automation.com
Collaborative robots are re-defining the way manufacturers operate today. To help further that process is... -
Predicting the Future of Industrial Maintenance
By Gernut van Laak, Group Automation Solutions Leader, ABB Food and Beverage
The need for factory maintenance often goes unnoticed. This article... -
Northrop Grumman Corporation announces appointment Om Prakash as Chief Executive, Japan
As chief executive, Northrop Grumman Japan, Prakash will be responsible for ensuring effective performance on current programs, as well as...
-
Evaluation of Different Additive Manufacturing Processes with Liquids and Pastes
By Viscotec
The use of additive manufacturing processes is increasing within industrial applications, as they bring some significant customer... -
Integrators Talk about Collaborative Robots: A Roundtable Discussion
By Jeff Burnstein, A3
The Association for Advancing Automation (A3) reached out to several large automation integrators to get their input on the...