By Bill PalifkaOn Oct. 23, 2018, America’s Water Infrastructure Act (AWIA) of 2018 was signed into law, essentially requiring water utilities to be better prepared for a wide range of threats. It requires water utilities to thoroughly assess their vulnerabilities to all types of natural hazards and man-made disasters and develop a detailed plan to address them.
Section 2013 of AWIA, through an amendment to the Safe Drinking Water Act (SDWA), introduced a new requirement for every public water system that serves more than 3,300 people to conduct a Risk and Resilience Assessment (RRA) and prepare (or revise) an Emergency Response Plan (ERP). If multiple entities are involved in water supply, treatment and distribution – such as wholesale suppliers, treatment operators and (separately owned) distribution systems – all would need to separately conduct RRAs and develop ERPs for assets under their control. Utilities are required to certify to the U.S. Environmental Protection Agency (EPA) that both have been completed by established statutory deadlines. By Luke WilladsenBLUF: This blog series is written to provide an anecdotal history of the evolution of exploitation in cybersecurity, focused largely on network exploitations in an enterprise and couched as Luke’s perspective over his decade-long career in InfoSec.
To best discuss the state of exploitations in cybersecurity in 2010-2015, let’s first take a brief walk back in time to put your mind in the right timeframe. The year was 2010, and…
By Luke WilladsenWhat is an Exploitation, Anyway?
If we leave it up to Merriam Webster an ‘exploitation’ is “an act of instance of exploiting.” Because that doesn’t quite clear things up, we’ll take it one step further: “to make use of meanly or unfairly for one’s own advantage.” When it comes to cybersecurity, and in keeping things ethical, exploitation is the execution of any method or technique that can be used to accomplish one of the following:
With a working definition that’s more in-line with the intention of this blog, let’s explore how one can ethically exploit something or someone. |