Scada after Stuxnet: Best practice to reduce risk
In June 2009, a sophisticated and destructive digital worm was unleashed with a single-minded purpose: to cripple the industrial control infrastructure instrumental to Iran's uranium enrichment program. The Stuxnet virus not only became known as one of the most potent "zero-day" attacks on a critical infrastructure that included a Supervisory Control and Data Acquisition (Scada) system, but it is regarded as an act of cyber-sabotage that would forever change the threat landscape. How did Stuxnet change thinking of how a nation's critical infrastructure is to be protected? This HP white paper will separate the fact from fiction on the threats and vulnerabilities to Scada systems and networks.