Page 103 - Intelligent Digital Oil And Gas Fields
P. 103

72                                        Intelligent Digital Oil and Gas Fields


          just 3 million in 2009. The Shamoom malware incident of August 2012 is
          one of the most significant cyber-attacks directed against the industry giant
          Saudi Aramco. Shamoom quickly deleted digital content on hard disks and it
          is estimated that >30,000 computers systems were affected (Roberts, 2012;
          Mills, 2013).
             Virus: A virus is a program that propagates itself from one comput-
          ing device to another with the legitimate user’s unknowing authorizat-
          ion or intervention. The damage done by a virus is unforeseen and
          unpredictable as each of the virus is designed for specific activity and pur-
          pose and can range from misleading the users to do a certain activity to
          destroying completely the computing device itself. The virus is embed-
          ded in an email, or documents that are shared such as photos and videos.
          If a virus-infected file is shared through a physical storage drive like a
          USB flash drive, the virus can spread even without omnipresent connec-
          tivity. The threat of viruses for the O&G industry is the same as for other
          industries.
             Worm: Like a virus, a worm moves from one computing device to
          another and keeps a record of the previous computing environment it
          was in, thus providing the attackers a trail of information of the systems.
          These are self-replicating programs unlike viruses, which are fixed but
          spread due to some human intervention.
             Denial of Service (DoS): DoS attack is an incident in which a business’s
          computing systems are unable to fulfill the service requests that are being
          requested, because its computing resources are overloaded. Typically, this
          happens when an attacker creates a massive amount of service requests aimed
          at a particular service with an aim of bringing down the service, such that the
          computing system both become overloaded in various resources available to
          it and is unable to take any more legitimate requests. DOS is one of the hard-
          est kinds of attack to predict and prevent.
             SCADA attack: As mentioned above, SCADA systems are the heart of
          O&G industry operations, so its security is crucial. Typically, SCADA
          transactions are done without close security at the source; thus, the inter-
          ceptors can read and use for their benefits. In addition, devices in SCADA
          systems have very limited memory and bandwidth for storing and
          implementing authentication solutions, so as a result may allow for injec-
          tion of requests that can create havoc for field operations. SCADA systems
          have evolved to become a decentralized series of interconnected networks
          and thus become more vulnerable. If SCADA systems are attacked and
          infiltrated, the result could be damage to various assets deployed on the
   98   99   100   101   102   103   104   105   106   107   108