Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)

Buy
There exists a 0-day vulnerability in a particular line of SCADA Master products that are widely used in petrochemical facilities. Furthermore, since the telemetry between the Master and the RTUs (the units located at valves, gauges, etc.) is particularly fragile under attack, the attackers are able to take a two-tiered approach to the damage they cause.

The vulnerability is designed to simply replace a small bit of code in the SCADA Master so that upon communication with the RTUs, it will unpredictably send invalid data; the way in which the communications are invalid also varies somewhat. The symptoms of this appear not at the Master level, but in the RTUs themselves, which have unpredictable results. The first set of disasters occur as valves fail to close or open, or particular RTUs cease providing data.

It takes a bit of time for law enforcement to have a solid handle on things, as they are currently battling their own issues, but they notice the pattern. The SCADA systems are immediately segmented from other networks, and work begins on replacing RTUs. This, however, has no effect, and as time passes the ripples of the attack spread. Gas stations run out of gas, followed shortly by freight carriers. Private individuals and local police and fire departments are not far behind.

Disaster can only be prevented by Reuben, an elite cyber-security researcher who stumbles across the plot while contracting for the federal government.

About the Author
Rob Shein, also known as Rogue Shoten, works as an independent consultant in the Washington, DC area. His experience includes doing hard time at Network Solutions, followed by VeriSign, where he was a member of the FIRE Team, providing incident response and penetration testing services to Fortune 100 clients. 

Marcus H. Sachs is the Director of the SANS Internet Storm Center and is a cyberspace security researcher, writer, and instructor for the SANS Institute. He previously served in the White House Office of Cyberspace Security and was a staff member of the President's Critical Infrastructure Protection Board. While a member of the White House staff, Mr. Sachs coordinated efforts to protect and secure the nation's telecommunication and Internet infrastructures, leveraging expertise from United States government agencies, the domestic private sector, and the international community. 

David Litchfield leads the world in the discovery and publication of computer security vulnerabilities. This outstanding research was recognized by Information Security Magazine who voted him as 'The World's Best Bug Hunter' for 2003. To date, David has found over 150 vulnerabilities in many of today's popular products from the major software companies (the majority in Microsoft, Oracle). 

(HTML tags aren't allowed.)

Kant's Search for the Supreme Principle of Morality
Kant's Search for the Supreme Principle of Morality
'... the author joins the discussion of the grounds for a moral theory that has preoccupied philosophers for some time, and advances that discussion significantly further. This is a book that will be required reading for those interested in that topic of Kant's moral theory.' Roger Sullivan, author of Immanuel Kant's Moral Theory and An...
Ethernet Networks: Design, Implementation, Operation,& Management
Ethernet Networks: Design, Implementation, Operation,& Management
Ethernet Networks, Fourth Edition, provides everything you need to know to plan, implement, manage and upgrade Ethernet networks.
  • Improve your skills in employing Ethernet hubs, switches, and routers.

  • Learn how to set up and operate a wireless Local Area Network (LAN).

    ...
Show Me Microsoft Office Outlook 2003
Show Me Microsoft Office Outlook 2003

Microsoft Office Outlook 2003 provides powerful new tools with which to get connected, manage information, and communicate with others. It is the most-changed application in this revision of the Office products, including an entirely new interface as well as improvements in junk mail blocking and security. Outlook 2003 takes advantage of the...


Bayesian Analysis of Item Response Theory Models Using SAS
Bayesian Analysis of Item Response Theory Models Using SAS

Written especially for psychometricians, scale developers, and practitioners interested in applications of Bayesian estimation and model checking of item response theory (IRT) models, this book teaches you how to accomplish all of this with the SAS MCMC Procedure. Because of its tutorial structure, Bayesian Analysis of Item Response...

The Adobe Photoshop Layers Book
The Adobe Photoshop Layers Book
Any time you try to develop a skill, you want to make sure that you take advantage of the basic tools of the trade. If you were a bus driver, you would want to be sure you knew how to use the key, gas pedal, brake pedal, clutch, shift-stick, turn signals, and steering wheel, and where the gas goes to be sure you were going to...
The Web Programmer's Desk Reference
The Web Programmer's Desk Reference

One of the challenges of web programming is remembering what you can do with what, and what works with everything else. Sure, you can create a button, but can you change its color and font to match the style of your site? And are you sure it will look the same on all browsers? With The Web Programmer's Desk Reference, you can find...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy