SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThe incident occurred back in November 2011, or at least that was the story. Initial reports that an advanced hacker had taken control of a Supervisory Control and Data Acquisition (SCADA) system started to surface. This system controlled a physical component: a water pump. Not many of these types of attacks had been reported in the past, and made the report more alarming. Riding on the heels of the Stuxnet discovery, a real and more common threat to critical infrastructure was being realized. The report was quick to attribute the attacker to a country notorious for hacking. The report also indicated the compromised system was forced to operate beyond normal levels, causing a pump to fail. But was it true? Weeks later, the report and attribution were under criticismfrom ICS-CERT, who had conducted the incident handling steps for the Curran-Gardner Public Water District. By drawing a parallel to the Curran-Gardner attack, a sound and measureable tabletop exercise can be developed to help an organization deal with a reallife incident affecting a SCADA system.