Page 43 - Cyber Warnings
P. 43







The reason to threatened water transfer could be the poor cyber security of the water supply
control systems. That may include exposing the command board of a water delivery system to
the internet or not following some of the security procedures.


How to protect your water supply cyber assets

The best way to protect your water supply control board is to follow some of the procedures
being discussed further.

For instance, never expose your command board computer to the web connection for the
reason it may get the source of malware that could cause the malfunctioned operation of your
control applications.

Also, it’s so significant to mention that if you got some workstations being connected to the
internet which is logical, because the water supply facility would never get isolated and without
any communication to an external world – get careful that you would not even use removable
devices to do a data transfer from your computer being with the web connection to your
workstations being with the command application – simply because you always can catch a
malware from the global network.


The concluding talk

The aim of this article got to indicate to some challenges of water supply systems and raise
awareness about those sorts of critical infrastructure. We hope this kind of effort would give an
encouragement to more people being the part of researcher’s community to dig deeper and
explore this topic better.


About The Author

Since Milica Djekic graduated at the Department of Control Engineering at
University of Belgrade, Serbia, she’s been an engineer with a passion for
cryptography, cyber security, and wireless systems. Milica is a researcher
from Subotica, Serbia. She also serves as a Reviewer at the Journal of
Computer Sciences and Applications and. She writes for American and Asia-
Pacific security magazines. She is a volunteer with the American corner of
Subotica as well as a lecturer with the local engineering society.







43 Cyber Warnings E-Magazine – July 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   38   39   40   41   42   43   44   45   46   47   48