Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Thursday, 23 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

LSU Researchers Working to Prevent Cyber Attacks on Nation’s Infrastructure

by The Gurus
June 17, 2020
in Editor's News
Smart city
Share on FacebookShare on Twitter

Louisiana is home to many critical assets and companies that are crucial to our nation’s infrastructure. And LSU’s experts are working to conduct research and experiments to prevent and defend against cyber attacks.

According to the U.S. Department of Homeland Security, there are 16 critical infrastructure sectorsconsidered “so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof.” Those sectors include energy, chemical, nuclear reactors, materials and waste, as well as communications, transportation and emergency services.

“Digital disasters are actually very similar and probably more impactful than a natural disaster,” said Jeff Moulton, executive director of the Stephenson National Center for Security Research & Training or SNCSRT. SNCSRT is home to LSU’s applied research division, as well as its own applied research corporation, Stephenson Technologies Corporation or STC. Together they work with the defense and intelligence communities.

Since 2015, SNCSRThas received more than $100 million in award money. Members of SNCSRT include Stephenson Disaster Management Institute, Carrol L. Herring Fire & Emergency Training Institute, or FETI, Law Enforcement Online, or LEO, National Center for Biomedical Research & Training, or NCBRT, National Center for Disaster Fraud, or NCDF, and the LSU Transformational Technology and Cyber Research Center, or TTCRC.

FETI, STC, TTCRC and their on-campus cyber partner, Huntsville, Ala.-based Radiance Technologies, recently demonstrated a cyber attack on a full-scale industrial system.

“We’re going to launch an attack that makes the heat pump overheat. We’re going to tell that heat pump through digital instructions, to turn the nozzle up as far as it can go, until it completely melts down,” Moulton said. “We’re taking advantage of those flaws in the circuitry, attacking the circuitry, making it look like one thing or that it’s doing one thing but the gages that humans are actually looking at, are telling them something completely different.”

While the 16 types of infrastructure are different, Moulton said they do have one piece in common.

“That is a supervisory controlling data acquisition system, that’s the subcomponent in an industrial control system. The circuitry in those boards is what hackers are targeting. That’s what we’re actually hacking.”

The exercise shows the devastating and real effect a cyber attack could have on our nation’s critical infrastructure, and LSU is working to prevent it from happening.

“What we do is teach students, engineers, the people who are going to work on these systems what to look for, how to know that something is wrong, what are the anomalies, how do we understand what is really, truly happening and how can we prevent someone from tampering with those industrial control systems to start with,” Moulton said. “What are those cyber hygienic things you can take to prevent these things from ever happening to start with?”

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Astronaut Chris Hadfield delivers opening keynote as IP EXPO Europe has lift-off

Next Post

Corero Announces Global Partnership with Juniper Networks

Recent News

call centre

MyCena Improves Customer Data Access Protection in Call Centers and BPOs

March 23, 2023
Blue logo, capitalised letters. SPECOPS.

Fortune 500 Company Names Found in Compromised Password Data

March 23, 2023
Ferrari Data Breach: The Industry has its say

Ferrari Data Breach: The Industry has its say

March 22, 2023
security

What Is Observability, And Why Is It Crucial To Your Business?

March 21, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information