Now that everything's networked and process control systems are easy to hack, here's a quick-reference guide to figuring out who's behind each type of security incident.
EFFECT |
CAUSE |
All dams east of the Mississippi open simultaneously | China |
All bank vaults east of the Mississippi open simultaneously | Mafia |
Your car starts broadcasting your emails and voice mails at random intervals | Anonymous |
Local Redbox only dispenses porn | Malicious computer science majors |
Toilets in middle school flush continuously | Bored middle schoolers |
Wii controller can be used to make your fridge dispense lemonade ice cubes | Your kids (duh) |
Read more about critical infrastructure in CSOonline's Critical Infrastructure section.
Other stories by Derek Slater
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.