Is Your Data Center Ready for STUXNET?
The STUXNET worm initially spreads indiscriminately, but includes a highly specialized malware payload that is designed to target Siemens Supervisory Control And Data Acquisition (SCADA) systems that control and monitor specific industrial processes common in a data center. This has operators of mission critical data centers concerned about any security gaps between IT and facilities systems.
March 15, 2011
In July of 2010 a computer worm known as STUXNET infiltrated the industrial software and equipment of an Iranian nuclear power facility and damaged a number systems. While it is not the first time that hackers have targeted industrial systems, it is the first known malware with the ability to cause physical damage to electrical or mechanical devices, which makes this webinar very timely.
The STUXNET worm initially spreads indiscriminately, but includes a highly specialized malware payload that is designed to target Siemens Supervisory Control And Data Acquisition (SCADA) systems that are configured to control and monitor specific industrial processes common in a data center. This has operators of mission critical data centers concerned about any security gaps between IT and facilities systems.
To find out more about how SCADA worms such as STUXNET are able to cause physical damage in "the real world" you will want to attend this webinar from Lee Technologies. This webinar is being held on March 25, 2011 at 2:00 EST and will provide insights on:
How devices with the same vulnerabilities that were exploited by STUXNET are used in on site power generation, electrical switchgear and mechanical systems applications in U.S. facilities.
How Stuxnet was able to penetrate a highly secure facility and infect devices with no connection to the Internet.
Why public sector and commercial data centers are enticing targets for the next SCADA worm cyberattack.
About the Author
You May Also Like