亚洲爆乳成AV人在线视菜奈实_欧美一进一出抽搐大尺度视频 _日本十八禁免费看污网站_国产一区二区怡红院_6080YY新视觉影院_蜜臀AV无码人妻精品_成人影院YY111111在线_成人欧美一区二区三区1314_少妇饥渴偷公乱A级无码

中國自動化學會專家咨詢工作委員會指定宣傳媒體
新聞詳情

卡巴斯基報告:能源和工控系統(tǒng)集成公司面臨最高的網絡攻擊風險

http://www.debgrams.com 2018-04-10 16:45 《中華工控網》翻譯

Kaspersky Report: Energy and ICS Integration companies face highest chance of cyberattack
卡巴斯基報告:能源和工控系統(tǒng)集成公司面臨最高的網絡攻擊風險

A report from Kaspersky Lab found that in the second half of 2017, nearly 40 percent of all industrial control systems (ICS) in energy organizations protected by Kaspersky Lab solutions were attacked by malware at least once – closely followed by 35 percent of engineering & ICS integration networks.

卡巴斯基實驗室發(fā)布的一份報告發(fā)現(xiàn),在2017年下半年,受卡巴斯基實驗室解決方案保護的能源組織中,有近40%的工業(yè)控制系統(tǒng)(ICS)至少遭到一次的惡意軟件攻擊,緊隨其后的是35%的工程和工控系統(tǒng)集成網絡。

The Kaspersky Lab report, “Threat Landscape for Industrial Automation Systems in H2 2017,” also found that for all other industries (manufacturing, transportation, utilities, food, healthcare, etc.) the proportion of ICS computers attacked ranged from 26 percent to 30 percent on average. The vast majority of detected attacks were accidental hits.

這份“2017年下半年工業(yè)自動化系統(tǒng)威脅情況”卡巴斯基實驗室報告還發(fā)現(xiàn),對于所有其他行業(yè)(制造業(yè)、交通運輸業(yè)、公用事業(yè)、食品、醫(yī)療保健等)而言,工控系統(tǒng)計算機遭受攻擊的比例平均介乎26%到30%之間。絕大多數(shù)檢測到的攻擊都是意外擊中。

The cybersecurity of industrial facilities remains an issue that can lead to very serious consequences affecting industrial processes, as well as businesses losses. While analyzing the threat landscape in different industries, Kaspersky Lab ICS CERT recorded that nearly all industries regularly experience cyberattacks on their ICS computers. However, there are two industries that were attacked more than others – energy organizations (39%), and engineering and ICS integration businesses (35%).

工業(yè)設施的網絡安全仍然是一大問題,可能導致影響工業(yè)流程的嚴重后果,造成企業(yè)損失。在分析不同行業(yè)的威脅情況時,卡巴斯基實驗室工控系統(tǒng)網絡應急響應小組記錄了幾乎所有行業(yè)其工控系統(tǒng)計算機日常遭受的網絡攻擊。但有兩個行業(yè)較其他行業(yè)受到的攻擊更多,那就是能源機構(39%),以及工程和工控系統(tǒng)集成業(yè)務(35%)。

1

The sector that demonstrated the most noticeable growth of ICS computers attacked during the second half of 2017 (compared to the first half of 2017) was construction, with 31 percent attacked. The relatively high percentage of attacked ICS computers in the construction industry compared to the first half of 2017 could indicate that these organizations are not necessarily mature enough to pay the required attention to the protection of industrial computers. Their computerized automation systems might be relatively new and an industrial cybersecurity culture is still being developed in these organizations.

在2017年下半年(與2017年上半年相比),工控系統(tǒng)計算機受攻擊上升最為明顯的行業(yè)是建筑業(yè),有31%受到攻擊。與2017年上半年相比,建筑行業(yè)受到攻擊的工控系統(tǒng)計算機的比例相對較高,這可能表明這些機構未必足夠成熟,無法對工業(yè)計算機的保護給予必要的關注。他們的計算機自動化系統(tǒng)可能相對較新,并且這些組織仍未確立工業(yè)網絡安全意識。

The lowest percentage of ICS attacks – 15 percent – has been found in enterprises specializing in developing ICS software, meaning that their ICS research/development laboratories, testing platforms, demo stands and training environment are also being attacked by malicious software, although not as often as the ICS computers of industrial enterprises. Kaspersky Lab ICS CERT experts point to the significance of ICS vendors’ security, because the consequences of an attack spreading over the vendor’s partner ecosystem and customer base could be very dramatic – as seen during the ExPetr malware epidemic.

專注于開發(fā)工控系統(tǒng)軟件的企業(yè)受攻擊比例最低,僅為15% ,不過這意味著這些工控系統(tǒng)研究/開發(fā)實驗室、測試平臺、演示臺和培訓環(huán)境也會受到惡意軟件的攻擊,盡管不像工業(yè)企業(yè)的工控系統(tǒng)計算機那么頻繁。卡巴斯基實驗室工控系統(tǒng)網絡應急響應小組專家了指出工控系統(tǒng)供應商安全的重要性,因為對供應商合作伙伴生態(tài)系統(tǒng)和客戶群的攻擊蔓延的后果可能非常強烈——正如ExPetr惡意軟件流行期間所發(fā)生的。

Among the new trends of 2017, Kaspersky Lab ICS CERT researchers have discovered a rise in mining attacks on ICS. This growth trend began in September 2017, along with an increase in the cryptocurrency market and miners in general. But in the case of industrial enterprises, this type of attack can pose a greater threat by creating a significant load on computers, and as a result, negatively affecting the operation of the enterprise’s ICS components and threatening their stability.

在2017年的新趨勢中,卡巴斯基實驗室工控系統(tǒng)網絡應急響應小組的研究人員發(fā)現(xiàn)了對工控系統(tǒng)挖礦攻擊的增加。這種增長趨勢始于2017年9月,伴隨加密貨幣市場火爆和礦工總體增加。但對工業(yè)企業(yè)而言,這類攻擊可能會對計算機造成重大負擔從而構成更大的威脅,對企業(yè)的工控系統(tǒng)組件的運行產生負面影響并威脅其穩(wěn)定性。

Overall, during the period from February 2017 to January 2018, cryptocurrency mining programs attacked three percent of industrial automation system computers, in most cases accidentally.

總的來說,在2017年2月至2018年1月期間,加密電子貨幣挖掘程序攻擊了3%的工業(yè)自動化系統(tǒng)計算機,絕大多數(shù)是意外攻擊。

Other highlights from the report include:
報告的其他亮點包括:

  • Kaspersky Lab products blocked attempted infections on 38% of ICS computers protected by them. This is 1.4 percentage points less than in the second half of 2016.
  • The internet remains the main source of infection with 22.7% of ICS computers attacked. This is two percent higher than in the first six months of the year. The percentage of blocked web-borne attacks in Europe and North America is substantially lower than elsewhere.
  • The top five countries by percentage of ICS computers attacked has remained unchanged since reported in the first half of 2017. This includes Vietnam (70%), Algeria (66%), Morocco (60%), Indonesia (60%) and China (60%).
  • In the second half of 2017, the number of different malware modifications detected by Kaspersky Lab solutions installed on industrial automation systems increased from 18,000 to over 18,900.
  • In 2017, 11% of all ICS systems were attacked by botnet agents, a malware that secretly infects machines and includes them in a botnet network for remote command execution; the main sources of attacks like this were the internet, removable media and email messages.
  • In 2017, Kaspersky Lab ICS CERT identified 63 vulnerabilities in industrial systems and IIoT/IoT systems, and 26 of them have been fixed by vendors.

  • 有38%的受卡巴斯基實驗室產品保護的工控系統(tǒng)計算機遭遇攻擊,比2016年下半年減少1.4個百分點。
  • 互聯(lián)網仍然是主要感染源,有22.7%的工控系統(tǒng)計算機遭受攻擊,比當年前六個月高出兩個百分點。歐洲和北美網絡攻擊受阻的比例明顯低于其他地區(qū)。
  • 自2017年上半年報告以來,工控系統(tǒng)計算機遭受攻擊的前五位國家百分比保持不變。其中包括越南(70%),阿爾及利亞(66%),摩洛哥(60%),印度尼西亞(60%)和中國( 60%)。
  • 在2017年下半年,安裝在工業(yè)自動化系統(tǒng)上的卡巴斯基實驗室解決方案檢測到的不同惡意軟件修改數(shù)量從18,000個增加到18,900個以上。
  • 2017年,所有工控系統(tǒng)中有11%受到僵尸網絡代理的攻擊,這是一種惡意軟件,它會秘密感染機器并將其包含在僵尸網絡中以執(zhí)行遠程命令,這種攻擊的主要來源是互聯(lián)網、可移動媒介和電子郵件。
  • 2017年,卡巴斯基實驗室工控系統(tǒng)網絡應急響應小組發(fā)現(xiàn)了工業(yè)系統(tǒng)和工業(yè)物聯(lián)網 / 物聯(lián)網系統(tǒng)中的63個漏洞,其中26個已被供應商修復。

“The results of our research into attacked ICS computers in various industries have surprised us, “said Evgeny Goncharov, head of Kaspersky Lab ICS CERT. “For example, the high percentage of ICS computers attacked in power and energy companies demonstrated that the enterprises’ effort to ensure cybersecurity of their automation systems after some serious incidents in the industry is not enough, and there are multiple loopholes still there that cybercriminals can use.”

卡巴斯基實驗室工控系統(tǒng)網絡應急響應小組負責人Evgeny Goncharov表示:“我們對各行業(yè)受攻擊工控系統(tǒng)計算機的研究結果讓我們感到驚訝。例如,電力和能源公司遭受工控系統(tǒng)計算機攻擊的比例很高,這表明企業(yè)在行業(yè)發(fā)生嚴重事故后確保其自動化系統(tǒng)網絡安全的努力是不夠的,留給網絡犯罪分子利用的漏洞仍然很多。”

Kaspersky Lab ICS CERT recommends the following technical measures to be taken:
卡巴斯基實驗室工控系統(tǒng)網絡應急響應小組建議采取以下技術措施:

  • Regularly update operating systems, application software and security solutions on systems that are part of the enterprise’s industrial network.
  • Restrict network traffic on ports and protocols used on the edge routers and inside organization's OT networks.
  • Audit ICS component access control in the enterprise’s industrial network and at its boundaries.
  • Deploy dedicated endpoint protection solutions onto ICS servers, workstations and HMIs to secure OT and industrial infrastructure from random cyberattacks.
  • Deploy network traffic monitoring, analysis and detection solutions for better protection from targeted attacks.

  • 定期更新企業(yè)工業(yè)網絡系統(tǒng)中的的操作系統(tǒng)、應用軟件和安全方案。
  • 限制邊緣路由器和企業(yè)運營網絡內使用的端口和協(xié)議的網絡流量。
  • 在企業(yè)工業(yè)網絡及其邊界內,審核工控系統(tǒng)組件訪問控制。
  • 將專用端點保護解決方案部署到工控系統(tǒng)服務器、工作站和人機界面上,以保護運營和工業(yè)基礎設施免受隨機網絡攻擊。
  • 部署網絡流量監(jiān)控、分析和檢測解決方案,以更好地防范有針對性的攻擊。
版權所有 工控網 Copyright?2025 Gkong.com, All Rights Reserved
中文字幕亚洲情99在线| 欧美一区二区三区孕妇精品| 欧美日韩精品久久久免费观看 | 公交车后车座疯狂的做的细节| 公交车上噗嗤一声尽根而没| 国产精品扒开腿做爽爽爽| 国产揄拍国产精品| 精品无码一区二区三区在线| 麻豆人妻少妇精品无码专区2 | 久久久噜噜噜WWW成人网| 蜜臀av色欲一区二区三区麻豆 | 男女无遮挡XX00动态图1| 青青草无码伊人久久| 色窝窝无码一区二区三区成人网站| 婷婷四房综合激情五月在线| 亚洲AV无码一区二区三区系列| 亚洲性日韩精品一区二区三区| 中文字幕乱理片人妻无码888| WWWらだ天堂中文在线| 夫妻二人体验交换夫妻的后果| 国产蜜臀AV无码一区二区三区| 好了AV第四综合无码久久 | 日日AV色欲香天天综合网| 无码人妻精品丰满熟妇区| 亚洲妇女无套内射精| 一面膜上边一面膜下边日本| BGMBGMBGM成熟交| 放荡娇妻张开腿任人玩H| 国产日韩精品一区二区三区在线观| 久久99久久99小草精品免视看| 你太紧了真舒服小说| 日韩精品内射视频免费观看| 午夜无码乱码在线观看| 亚洲色18禁成人网站WWW| 2021精品亚洲中文字幕| 成人综合激情另类小说| 国产无人区一卡二卡3卡4卡在线| 久久精品AⅤ无码中文字字幕| 年轻丰满的继牳3免费看| 日韩人妻无码精品-专区| 午夜福利麻豆国产精品| 亚洲熟女乱色一区二区三区| 97碰碰碰人妻无码视频| 丰满多毛的大隂户毛茸茸| 国内粗鲁VIDEO老熟妇| 久久夜色精品国产亚洲AV动态图 | 亚洲S色大片在线观看| 柚子猫原神甘雨视内射频| 八戒八戒神马影院在线观看| 国产精品香港三级国产AV| 久久见久久久国产精品蜜桃| 欧美三级不卡在线观看| 天堂А√在线最新版在线 | А√天堂网WWW在线搜索| 国产精东天美AV影业传媒| 精品无码人妻少妇久久久久久| 欧美18VIDEOSEX性欧美| 熟女一区二区三区| 亚洲国产精品一区第二页| 18禁止导深夜福利备好纸巾| 丰满老熟好大BBB| 娇小性XXXXX极品娇小| 男女性色大片免费网站| 少妇下蹲露大唇无遮挡| 亚洲精品无码AV中文永久在线| 8V蜜桃网最新电影| 国产成AV人片在线观看天堂无码 | 43417大但人文艺术| 国产 亚洲 无码 激情| 精品国精品无码自拍自在线| 欧美成人影院亚洲综合图| 婷婷97狠狠成人免费视频| 亚洲熟妇AV日韩熟妇AV| АⅤ资源中文在线天堂| 国产肉体XXXX裸体XXXX| 蜜桃av无码一区二区三区| 少妇人妻无码精品视频APP| 亚洲欧美在线制服丝袜国产| chinese人妻无码人妻| 国产精品一国产精品| 老师你乖乖的可以让你少吃点苦头| 日韩人妻无码精品二专区| 亚洲国产精品不卡AV在线| AV色综合久久天堂AV色综合在 | 亚洲成A人V在线蜜臀| 97亚洲狠狠色综合久久| 国产精品久久久久久久久岛 | 少妇 黑人 欧美 亚洲| 亚洲日韩国产一区二区蜜桃| 被公侵犯的漂亮人妻中文字幕| 国产又粗又猛又爽又黄的视频在线 | 日韩久久一区二区三区蜜桃| 亚洲国产成人精品无码区在线| FREE性欧美高清VIDEOS| 国产亲子伦ⅩⅩⅩⅩX熟妇视频| 免费观看潮喷到高潮| 婷婷综合另类小说色区| 伊人色综合久久天天五月婷| 粉嫩AV一区二区三区免费观看| 久久99精品久久久久免费| 人人做人人妻人人精| 亚洲国产成人无码AV在线播放| JAPANESE老熟妇乱子伦视| 国精一二二产品无人区免费应用| 欧美粗大猛烈老熟妇| 午夜亚洲AⅤ无码高潮片在线观看| 中文字幕少妇人妻av护士人妻| 国产韩国精品一区二区三区久久| 老妇FREE性VIDEOSXX| 天天躁日日躁狠狠躁| 又大又粗又爽A级毛片免费看| 各种女BBWBBWBBW么| 久久亚洲精品无码AV红樱桃| 熟妇人妻一区二区三区四区| 一边下奶一边吃面膜视频| 粉嫩AV一区二区三区| 久久久久亚洲AV成人片一区| 色五月丁香五月综合五月4438| 一本大道香蕉久97在线播放| 公车上玩弄白嫩少妇| 久热中文字幕无码视频| 天美传媒MV免费观看| 在线播放无码高潮的视频| 国产传媒中文字幕视频专区| 蜜臀人妻四季AV一区二区不卡| 无码人妻精品一区二区蜜桃AV| 337P日本欧洲亚洲大胆69影| 国产人妖视频一区二区| 欧美黑人又大又粗高潮喷水| 亚洲AV毛茸茸av成熟女人| VODAFONEWIFI暴力| 精品粉嫩BBWBBZBBW| 日本亚洲色大成网站WWW| 亚洲午夜久久久久久噜噜噜| 公交车上荫蒂添的好舒服口述小说| 老男人吃奶疯狂啃肿奶头| 乌鸦传媒一二三区| 99精品国产一区二区电影| 好爽别插了无码视频| 人善交VIDEOS欧美3D| 亚洲熟妇无码一区二区三区导航| 大肉大捧一进一出视频出来呀| 久久久久亚洲精品无码网址蜜桃| 熟妇无码乱子成人精品| 孕妇奶水仑乱A级毛片免费看| 国产美女视频国产视视频| 欧美三级在线播放| 亚洲精品无码激情AV| 绯色AV一区二区三区蜜臀| 麻豆一二三四区乱码| 午夜精品久久久久9999高清| WRITEAS前后双插头| 精品综合无码奶水一区二区| 熟肉OVA初恋时间2附前作| 性欧美老妇人XXⅩ000| 99热这里有精品| 精品第一国产综合精品AⅤ| 三上悠亚公侵犯344在线观看| 中文字幕 亚洲精品 第1页| 国产人成无码视频在线| 人人妻人人澡人人爽人人蜜臀 | 国产精品久久久久国产A级| 欧美激情精品久久久久久| 亚洲精品无码AV中文字幕| 灌溉系统NPC游戏双男主| 男生听到女生喘气是什么心理现象 | 激情偷乱人伦小说视频| 色综合久久中文字幕有码| 中文字幕日本乱码仑区在线| 国内美女推油按摩在线播放 | 欧美久久高潮久久高潮| 亚洲人成网站18禁止无码| 国产成人精品人人2020视频| 欧美国产综合欧美视频| 亚洲热妇无码AV在线播放| 国产成人无码AV| 欧美人与物VIDEOS另类| 亚洲一区波多野结衣在线APP| 国产精品一国产精品一K频道| 人妻在夫面前被性爆| 在线天堂中文最新版| 好吊视频一区二区三区| 熟妇人妻不卡中文字幕| A级毛片免费观看网站| 久久精品国产只有精品66| 午夜成人亚洲理伦片在线观看| 波多野结衣高潮AV在线播放| 联系附近成熟妇女| 亚洲成A人片在线播放| 国产AV无码专区亚洲AVJUL| 强开小婷嫩苞又嫩又紧视频 | 亚洲AV片不卡无码久久| 成人无码AV网站在线观看| 免费一本色道久久一区| 亚洲欧美色国产综合| 国产精品女同一区二区| 日本边添边摸边做边爱边| 中文在线8资源库| 精品人妻一区二区三区视频53一| 婷婷五月六月激情综合色中文字幕|