preview

Security Firm Symantec : An Evolving National Strategy

Decent Essays

Unfortunately, with the rise of interests and increasing in exports it was only a matter of time before the industry of aerospace, defense, and security was going to experience cybersecurity threats. In this industry, vulnerabilities such as compromised Personally Identifiable Information (PII), Distributed Denial of Service (DDoS) attacks on the critical infrastructure to attacks such as economic espionage exist. “Agencies and companies are facing significant and ongoing cybersecurity and safety threats, while at the same time confronting nontechnical issues including budget uncertainty, an evolving national strategy, and how, when, where, and if information can be shared among impacted agencies and industries” (Aerospace & Defense …show more content…

This malware is then capable of enumerating disk drives, contacting the command and control server, collecting system information, and downloading and executing additional updates. Any cyber criminal that can gather information from organizational machines within the defense and aerospace industry could use the information to harm the nation 's security. To prevent an attack such as this, organizations should ensure their software is updated and ensure training and security mechanisms are in place for email (Kovacs, 2013).
Unfortunately, this is not the only attack against the industry. There have also been reports of spying and even wire fraud. In January 2016 reports indicated that FACC, an Austrian company that is a known aerospace manufacturer who supplies engine and interior parts for Airbus and Boeing, posted on its company blog that it was hit by a massive cyber attack that allows hackers to take $55M from the company’s accounts. Although in this instance the attack appears to be financially driven it doesn’t mean that attacks in the future will be. Having information about engines being supplied to companies such as Airbus and Boeing could be detrimental for their use and national security (Billington, 2016)..
The exact details were not published, but it was believed the wire fraud was made possible with the use of spear phishing. Unfortunately, “’it is

Get Access