Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • Cybersecurity for Oil and Gas: An Overview
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Cybersecurity for Oil and Gas: An Overview

4 years ago Tripwire Guest Authors
Cybersecurity for Oil and Gas: An Overview

The growing value of business data, the vulnerability of networked systems, and the importance of fuel infrastructure have made oil and gas companies major targets for malicious hackers. Already, the industry has been the victim of several high-profile attacks. The Colonial Pipeline hack compromised the business’s networks, shut down its operations, and deprived the East Coast of a pipeline that supplies nearly half the region’s fuel.

Oil and gas companies need to invest in cybersecurity and quickly. Otherwise, some of the nation’s most important infrastructure could be left wide open to future attacks.

Cyber Threats Facing the Oil and Gas Industry

Significant changes to oil and gas systems have made companies much more vulnerable to cyberattacks over the past few years. Ongoing digitization in the industry and a transition away from centralized systems to distributed management strategies have made managing cyber risks essential for oil and gas.

Many businesses rely on weak cybersecurity strategies such as air-gapped systems, which are computers that are not connected to the Internet. In some cases, systems that were erroneously assumed to be air-gapped became easy targets for attacks.

While these strategies have never provided a strong defense against attacks, they may make companies especially vulnerable as time goes on. Legacy systems that were never intended to be easily accessible are now connected to the internet for visibility and maintenance purposes, closing the IT-OT gap for the industry.

Internet-connected systems and smart devices, which are increasingly common in heavy industry, help oil and gas companies to gather real-time data on field operations, improve maintenance, and increase vehicle fleet visibility. They also further increase the attack surface of company networks.

These systems may also store an immense amount of information about oil and gas apparatuses. A predictive maintenance tool that uses data from IoT sensors may include details such as the type of metal plating a machine uses to correctly predict machine wear, corrosion resistance, and conductivity.

All this information could be available to attackers who successfully breach a company’s cyber defenses.

Investment in smart technology and digitization are also accelerating, meaning that difficulties in securing these systems are likely to become harder to manage. Effective cybersecurity for oil and gas will be increasingly necessary as a result.

The Growing Cybersecurity Talent Gap May Create Additional Problems

Waiting to invest in cybersecurity could create challenges soon. There is a major shortage of cybersecurity professionals, and industry leaders believe the labor gap isn’t likely to shrink any time soon. The shortage is on track to worsen over the next few years, partly because many other sectors across the economy are struggling with their own new cybersecurity challenges.

If oil and gas businesses do not act now, they’ll only become less likely to hire the professional talent needed to develop strong cybersecurity policies and in-house security tools.

What Poor Cybersecurity Could Mean for the Industry

We already have a sense of what dangers the industry faces — and the potential consequences when hackers succeed.

The Colonial Pipeline carries 2.5 million barrels every day – around 45% of the East Coast’s gasoline, diesel, and jet fuel. After a ransomware attack targeting the company, the pipeline was offline for six days. Normal operations did not fully resume until another three days had passed.

As a result, the average national cost for gasoline rose to the highest point in six years, with prices rising between six and 19 cents per gallon. The company paid 75 bitcoin, approximately $4.4 million at the time, in ransom to the hackers.

Future attacks could have a similarly devastating impact — raising gas prices, threatening fuel supply, and significantly disrupting normal operations.

How the Industry Can Develop Cyber-Resilience

Each business in the oil and gas industry faces unique risks and will need to adopt some business-specific cybersecurity policies as a result. However, some commonalities will allow companies to take some of the same steps to strengthen their cyber defenses.

These principles and best practices will be essential for oil and gas companies wanting to modernize their cyber defenses and prepare for future threats.

1. Company-wide Cybersecurity Strategies

Effective cyber defenses require complete company buy-in. As IT and OT become more tightly linked and digital transformation connects business systems, siloing cybersecurity operations becomes risky.

Business governance models should facilitate business-wide collaboration that reduces the risk of isolating the cybersecurity team. Regular reviews of company structure and governance regarding security can help managers, owners, and company board members determine if their approach is working well.

2. Adopt Security as a Design Principle

Oil and gas systems should be designed with cybersecurity in mind. Security experts should be involved in new projects from the very beginning to ensure potential risks are considered at every step of the process.

All departments should be aware of potential threats and understand their own responsibilities regarding cyber-risk management.

3. Support for Business Cybersecurity Operations

A holistic risk-management approach should ensure cyber-resilience programs have the necessary resources, funding, access, and oversight to operate effectively. Standardized documentation and risk assessment processes will help businesses ensure cybersecurity operations are reported in a way that makes them easier to fund and sustain.

4. Collaboration and Information Sharing

Industry-wide collaboration, especially internationally, will become essential. Sharing threat information, discussing best practices, and collaborating with business partners will help oil and gas companies develop more effective cyber defenses.

Participating in conversations, becoming willing to collaborate with cyber professionals from other businesses, and working toward industry standards on policies will help the industry better prepare for threats.

The use of risk frameworks like the NIST Cybersecurity Framework or the ISO 27000 standard for information security could be an effective starting point.

Preparing Oil and Gas for Coming Cybersecurity Threats

The oil and gas industry faces mounting threats from cybercriminals. The cost of a successful breach is high, so businesses should act fast to develop effective security practices. A company-wide approach that encourages security as a design principle and facilitates collaboration will help businesses identify new threats and build secure systems.


About the Author: Emily Newton is the Editor-in-Chief of Revolutionized, an online magazine celebrating innovations in industry, science and technology. Subscribe to our newsletter for industry updates.

Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.

The post ” Cybersecurity for Oil and Gas: An Overview” appeared first on TripWire

Source:TripWire – Tripwire Guest Authors

Tags: Compliance, Finance, Goverment, High Severity, Malware, Ransomware, TripWire

Continue Reading

Previous Fake Ransomware Infection Hits WordPress Sites
Next Microsoft Warns about 6 Iranian Hacking Groups Turning to Ransomware

More Stories

  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link

3 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos

4 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

⚡ Weekly Recap: Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats

8 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach

Securing the Mid-Market Across the Complete Threat Lifecycle

8 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users

11 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware

14 hours ago [email protected] (The Hacker News)

Recent Posts

  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
  • Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos
  • ⚡ Weekly Recap: Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats
  • Securing the Mid-Market Across the Complete Threat Lifecycle
  • Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT