Page 22 - CDM-Cyber-Warnings-January-2014
P. 22
Firstly, ARPANET connected hundreds of universities and institutes in the United States by using leased telephone lines. As satellite communications and radio technology were developing , these technologies were also applied to ARPANET network. The United States Department of Defense came up with a new network architecture. This network was used for the seamless connection of these different communication networks. Later, it got a name TCP/IP model. TCP/IP is a sort of open protocol which means it enables people to fully enjoy the world sharing. Because of the openness of TCP/IP protocol, there are a lot of potential security risks related to application of this configuration. The main drawback is that designers did not take security into original consideration when they were developing the framework of TCP/IP protocols. Also, they also did not count on the future large-scale application of TCP/IP protocols. The issues regarding this network architecture include the poor scalability and insufficient addressing space. Also, the routing table is expanding. The network is not controllable, manageable, nor accountable. The network has no perception and measurement capabilities and the quality of service can’t be guaranteed. Some studies indicate that the current Internet condition is very vulnerable. Cyber attacks in nowadays have made a dramatic impact on enterprise’s operation and human’s personal life. For that reasons, many countries have already begun the research for the next generation Internet. Conclusion As an application of automation systems arises, there are more and more open questions which can concern today's engineers and scientist. At this moment, the most critical points in modern factory systems are their computing units and their communications lines. In general, hackers can break easily into industrial communications lines as they can access an ordinary PC connected to the Internet. The reason for that is the same technology has been used for the Internet as well as for industrial communications lines. In addition, industrial control systems also have their weaknesses and the future strategies and countermeasures should be developed in order to prevent such systems from possible cyber attacks. About The Author Milica Djekic is an Online Marketing Coordinator at Dejan SEO and the Editor-in-Chief at Australian Science Magazine, currently based in Novi Sad, Serbia. She received a Master of Science degree in Control Engineering from Faculty of Mechanical Engineering, University of Belgrade, Serbia in 2006. Her fields of interests are control systems, wireless technologies, cyber security, cryptography, speed enforcement systems, etc. At her spare time, Milica enjoys reading, researching and writing. + % %! ! & , ! . !( %+ ' "! "#+% ' - + % !& , ! % '& % & %) *"% *
   17   18   19   20   21   22   23   24   25   26   27