Colonial Pipeline Cyberattack

  • 64 Replies
  • 1926 Views
*

Space Cowgirl

  • MOM
  • Administrator
  • 44697
  • Official FE Recruiter
Re: Colonial Pipeline Cyberattack
« Reply #60 on: June 07, 2021, 06:05:05 PM »


Feds recover 'majority' of ransom money from Colonial Pipeline hack
I'm sorry. Am I to understand that when you have a boner you like to imagine punching the shit out of Tom Bishop? That's disgusting.

*

Shifter

  • 19522
Re: Colonial Pipeline Cyberattack
« Reply #61 on: June 07, 2021, 06:21:43 PM »
Haha nice.

They probably don't want to reveal how thy did it because people under your governments watchful eye still believe they can do things in secret
Actual Sunrise

Quote from: sokarul
what website did you use to buy your wife? Did you choose Chinese over Russian because she can't open her eyes to see you?

What animal relates to your wife?

Know your place

*

Bullwinkle

  • The Elder Ones
  • 19790
  • Standard Idiot
Re: Colonial Pipeline Cyberattack
« Reply #62 on: June 08, 2021, 03:28:09 AM »

Should critical infrastructure be accessible from the internet?

Eleven out of ten retarts can explain why the answer is NO.


*

JJA

  • 4899
  • Math is math!
Re: Colonial Pipeline Cyberattack
« Reply #63 on: June 08, 2021, 05:35:56 AM »

Should critical infrastructure be accessible from the internet?

Eleven out of ten retarts can explain why the answer is NO.

Done safely, the ability to monitor the entire grid requires at least one way communication which can be done safely, even over the internet.

*

markjo

  • Content Nazi
  • The Elder Ones
  • 41795
Re: Colonial Pipeline Cyberattack
« Reply #64 on: June 08, 2021, 03:50:20 PM »
Done safely, the ability to monitor the entire grid requires at least one way communication which can be done safely, even over the internet.
A lot of cloud based monitoring services already work like that.  Essentially, it's all device initiated communication where the device will push the information being monitored up to a secure cloud service and pull down any updates or change requests.  However, that is still only as secure as the data being pulled down from the cloud service by the device and there are times when the grid needs very nearly real-time tweaking.
Science is what happens when preconception meets verification.
Quote from: Robosteve
Besides, perhaps FET is a conspiracy too.
Quote from: bullhorn
It is just the way it is, you understanding it doesn't concern me.