{"id":500,"date":"2015-09-22T12:35:45","date_gmt":"2015-09-22T15:35:45","guid":{"rendered":"https:\/\/www.nachodelatorre.com.ar\/mosconi\/?p=500"},"modified":"2015-09-22T12:35:45","modified_gmt":"2015-09-22T15:35:45","slug":"a-new-defense-for-navy-ships-protection-from-cyber-attacks","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=500","title":{"rendered":"A New Defense for Navy Ships: Protection from Cyber Attacks"},"content":{"rendered":"<p>For most people, the term \u201ccyber security\u201d calls to mind stories of data theft like the recent hacks of the OPM database, or network spying like the 2012 breach of the Navy-Marine Corps Intranet.<\/p>\n<p>But in this networked world, hackers might also try to disable or take control of machines in our physical world\u2014from large systems like electric power grids and industrial plants, to transportations assets like cars, trains, planes or even ships at sea.<\/p>\n<p>In response, the U.S. Navy is developing the Resilient Hull, Mechanical, and Electrical Security (RHIMES) system, a cyber protection system designed to make its shipboard mechanical and electrical control systems resilient to cyber attacks.<!--more--><\/p>\n<p>\u201cThe purpose of RHIMES is to enable us to fight through a cyber attack,\u201d said Chief of Naval Research Rear Adm. Mat Winter. \u201cThis technology will help the Navy protect its shipboard physical systems, but it may also have important applications to protecting our nation\u2019s physical infrastructure.\u201d<\/p>\n<p>Dr. Ryan Craven, a program officer of the Cyber Security and Complex Software Systems Program in the Mathematics Computer and Information Sciences Division of the Office of Naval Research, explained that RHIMES is designed to prevent an attacker from disabling or taking control of programmable logic controllers\u2014the hardware components that interface with physical systems on the ship.<\/p>\n<p>\u201cSome examples of the types of shipboard systems that RHIMES is looking to protect include damage control and firefighting, anchoring, climate control, electric power, hydraulics, steering and engine control,\u201d explained Craven. \u201cIt essentially touches all parts of the ship.\u201d<\/p>\n<p>Attacks on mechanical systems that are operated by computers have happened before. Stuxnet, the famous industrial \u201ccomputer worm\u201d discovered in 2010 was designed to attack controllers of Iranian centrifuges, causing the centrifuges to run at very high speeds, effectively tearing themselves apart.<\/p>\n<p>\u201cAnother powerful example is the hacking of a German steel mill in 2014,\u201d Craven said. \u201cThe hackers reportedly got in and overheated a blast furnace, and even made it so that the plant workers couldn\u2019t properly shut down the furnace, causing massive damage to the system.\u201d<\/p>\n<p>Traditionally, computer security systems protect against previously identified malicious code. When new threats appear, security firms have to update their databases and issue new signatures. Because security companies react to the appearance of new threats, they are always one step behind. Plus, a hacker can make small changes to their virus to avoid being detected by a signature.<\/p>\n<p>\u201cInstead, RHIMES relies on advanced cyber resiliency techniques to introduce diversity and stop entire classes of attacks at once,\u201d Craven said. Most physical controllers have redundant backups in place that have the same core programming, he explained. These backups allow the system to remain operational in the event of a controller failure. But without diversity in their programming, if one gets hacked, they all get hacked.<\/p>\n<p>\u201cFunctionally, all of the controllers do the same thing, but RHIMES introduces diversity via a slightly different implementation for each controller\u2019s program,\u201d Craven explained. \u201cIn the event of a cyber attack, RHIMES makes it so that a different hack is required to exploit each controller. The same exact exploit can\u2019t be used against more than one controller.\u201d<\/p>\n<p>This work aligns with higher level strategic guidance to protect against cyber threats, like the U.S. Navy\u2019s \u201cCyber Power 2020,\u201d but the technology may also have benefits outside of the Navy.<\/p>\n<p>\u201cVulnerabilities exist wherever computing intersects with the physical world, such as in factories, cars and aircraft,\u201d Craven said, \u201cand these vulnerabilities could potentially benefit from the same techniques for cyber resilience.\u201d<\/p>\n<p><strong>Fuente:<\/strong>\u00a0<em><a href=\"http:\/\/science.dodlive.mil\/2015\/09\/21\/a-new-defense-for-navy-ships-protection-from-cyber-attacks\/?source=GovDelivery\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/science.dodlive.mil<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>For most people, the term \u201ccyber security\u201d calls to mind stories of data theft like the recent hacks of the OPM database, or network spying&hellip; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[23,29],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/500"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=500"}],"version-history":[{"count":0,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/500\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=500"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=500"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=500"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}