{"id":2754,"date":"2014-10-24T16:00:03","date_gmt":"2014-10-24T16:00:03","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=2754"},"modified":"2020-02-27T03:50:18","modified_gmt":"2020-02-26T16:50:18","slug":"critical-systems-and-bottlenecks","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/critical-systems-and-bottlenecks\/2754\/","title":{"rendered":"Critical systems and bottlenecks"},"content":{"rendered":"<p>A critical civilian system goes down \u2013 it\u2019s a scenario that evokes some apocalyptic pictures of destruction and mayhem; remember, for instance, \u201cDie Hard 4.0\u201d? A group of motivated hackers try hacking into government and commercial computers, and bring down all traffic lights in a major city. Unsettling. Actually, every business has its own sort of \u201ccritical\u201d system that\u2019s necessary for its continuous existence. It should be well defended as well as resilient to threats. Architectural errors may diminish this resilience heavily.<\/p>\n<p>Threatpost ran <a href=\"https:\/\/threatpost.com\/april-911-outage-affected-3-5-percent-of-u-s-population\/108974\" target=\"_blank\" rel=\"noopener nofollow\">an article<\/a> on an incident in April with one of the mainstays of American society \u2013 911 service.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>A critical civilian system goes down \u2013 apocalypse now? #security<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FAs4F&amp;text=+A+critical+civilian+system+goes+down+%E2%80%93+apocalypse+now%3F+%23security\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>\u201cIn the early hours of April 10, a series of errors led to a massive, multi-state outage in the emergency call management centers (ECMCs) that handle 911 calls in seven geographically dispersed states. The incident originated at an obscure but critical call routing hub in Englewood, Colo., and ended up knocking out the emergency communication infrastructure for more than 11 million citizens\u201d, wrote Brian Donohue at Threatpost. Well, this sounds bad. 911 service is a critical system that\u2019s supposed to be working ceaselessly. An outage as massive as this that affects (possibly) 3.5% of the US population is a clear emergency. During the outage 87% of the 911 calls made during this outage failed; it seems like a miracle that there were no deaths as a result.<\/p>\n<p>The detailed analysis of the incident is available <a href=\"https:\/\/threatpost.com\/april-911-outage-affected-3-5-percent-of-u-s-population\/108974\" target=\"_blank\" rel=\"noopener nofollow\">at Threatpost<\/a>; in short it looks like a number of factors cross-contributed to the outage, namely a software error, ageing equipment, some human errors and, most of all, a big architectural deficiency:<\/p>\n<p>\u201cThe enormous breadth and the geographic dispersion of the outage, the FCC says, was in part attributable to an architecture that consolidated critical 911 functions in two locations serving multiple states, without adequate safeguards in place,\u201d Donohue writes.<\/p>\n<p>Now, this is a thought-provoking situation. A system of that scope has an apparent bottleneck, and once it is stuck, the entire system crumbles.<\/p>\n<p>This scenario is applicable to just about any corporate IT infrastructure. As said above, almost all companies have their own \u201ccritical\u201d system, required for ceaseless operations and, essentially, survival. As a matter of fact, every corporate system has its own \u201cbottlenecks\u201d, for instance \u2013 the main gateway, or even a website, that\u2019s vital to the business.<\/p>\n<p>Recently a fellow IT worker told a story he witnessed a year ago: a small company\u2019s main website had been planted with some malware. It was easily detected by an antimalware solution, wasn\u2019t too harmful, and took one day\u2019s worth of downtime to eradicate it without a trace.<\/p>\n<p>But while the malware was there, the search engines brought the website\u2019s rankings down so low that it took weeks, even months to restore its previous position. And this proved to have ghastly consequences for the company\u2019s business: it was on the brink of closing, staff had been cut in half and finances \u2013 what finances? A scary story, but unfortunately real. The website was vital, it had been \u201cpoisoned\u201d with malware (possibly by some competitors). Then there was a tailspin, which the company barely survived.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Every corporate infrastructure has its own \u201ccritical systems\u201d #enterprisesec<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FAs4F&amp;text=Every+corporate+infrastructure+has+its+own+%26%238220%3Bcritical+systems%26%238221%3B+%23enterprisesec\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Yet another possible scenario that some admins experiences recently: a Cryptolocker ransomware slipped into the corporate network and into backup servers, encrypting everything within its grasp. If the network and storage have architectural deficiencies \u2013 i.e. aren\u2019t segmented \u2013 and the Crypto can reach everywhere guess what happens next?<\/p>\n<p>In a nutshell, while architectural errors may bring problems on their own, there\u2019s a strong possibility that in case of emergency they would aggravate the situation. Just the same way as if a fire exit was blocked with some old furniture, rubbish or a broken lock. Unless there are more fire exits, the consequences will be disastrous. Unless a system has an extra margin of safety, its security can\u2019t be guaranteed.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A critical civilian system goes down \u2013 it\u2019s a scenario that evokes some apocalyptic pictures of destruction and mayhem; remember, for instance, \u201cDie Hard 4.0\u201d? Actually this could happen with any corporate infrastructure, since all of them have certain critical systems of their own.<\/p>\n","protected":false},"author":209,"featured_media":15907,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,2994],"tags":[2206,2207,2208,422],"class_list":{"0":"post-2754","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-2206","10":"tag-critical-system","11":"tag-system-shutdown","12":"tag-threats"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/critical-systems-and-bottlenecks\/2754\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/critical-systems-and-bottlenecks\/2754\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/critical-systems-and-bottlenecks\/2754\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/911\/","name":"911"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/2754","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=2754"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/2754\/revisions"}],"predecessor-version":[{"id":26544,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/2754\/revisions\/26544"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/15907"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=2754"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=2754"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=2754"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}