Daily Archive: June 1, 2012

Electricity subsector cybersecurity capability maturity model (may 2012) 0

Electricity subsector cybersecurity capability maturity model (may 2012)

“The Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2), which allows electric utilities and grid operators to assess their cybersecurity capabilities and prioritize their actions and investments to improve cybersecurity, combines elements from existing cybersecurity efforts into a common tool that can be used consistently across the industry. The Maturity Model was developed as part of a White House initiative led by the Department of Energy in partnership with the Department of Homeland Security (DHS) and involved close collaboration with industry, other Federal agencies, and other stakeholders….”

The Atomic Bomb of Cyberspace 0

The Atomic Bomb of Cyberspace

“Its official. The United States of America was the first to use an atomic bomb against an enemy and now the United States is the first to have acknowledged using a cyber weapon against another country. We are now certified bad guys to the rest of the world….”

Friday Squid Blogging: Mimicking Squid Camouflage 0

Friday Squid Blogging: Mimicking Squid Camouflage

Interesting : Cephalopods – squid, cuttlefish and octopuses – change colour by using tiny muscles in their skins to stretch out small sacs of black colouration. These sacs are located in the animal’s skin cells, and when a cell is ready to change colour, the brain sends a signal to the muscles and they contract

ISC Feature of the Week: Country and Region Report, (Fri, Jun 1st) 0

ISC Feature of the Week: Country and Region Report, (Fri, Jun 1st)

Overview As a quick follow on to last weeks feature Country Report, today we’ll take a look at the Country list page at https://isc.sans.edu/country.html. This page lists country, region and total reports by date with option to limit by port number. Also, this links to Region Report at https://isc.sans.edu/regionreport.html for overall reports per region with date and port criteria.

Threats to water system must be fixed to help state's economy 0

Threats to water system must be fixed to help state's economy

“Threats to California's water system must be addressed now in order for the state's economy to grow and prosper, according to a report by the Public Policy Institute of California released late Wednesday. The continued expansion of water management tools, such as the reuse of highly treated wastewater, underground storage and water “banking,” will allow California to manage future water shortages, the report concludes

How Obama Was Dangerously Naive About STUXNET and Cyberwarfare 0

How Obama Was Dangerously Naive About STUXNET and Cyberwarfare

“If the New York Times' comprehensive account of the birth of the STUXNET worm that slowed Iran's efforts to enrich uranium tells us anything, it's that the Obama administration was remarkably naive about the potential for the proliferation of the cyberweapons it was developing. Indeed, while discussions of the new territory the US was entering apparently took place in the White House, ultimately, an aide told the Times, the administration didn't want to “develop a grand theory for a weapon whose possibilities they were still discovering.”Then, in Summer 2010, an event the administration should have anticipated occurred: The STUXNET worm got loose and started replicating outside the Iranian enrichment plant that had been its target. In the wild, on the Internet, its source code was exposed for everyone to see….”