Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Critical Vulnerability
  • Protecting Against Bad Chemistry (with Cybersecurity)
  • Critical Vulnerability

Protecting Against Bad Chemistry (with Cybersecurity)

4 years ago Irfahn Khimji
Protecting Against Bad Chemistry (with Cybersecurity)

Do you recall one of the first really fun chemistry experiment you performed as a child?  If your school followed the usual curriculum, then you probably made a model volcano and then added some baking soda to the opening, followed by the addition of vinegar.  A variation of this experiment was to add the ingredients to a plastic bottle, then stretch a balloon over the mouth of the bottle to watch the balloon inflate with carbon dioxide gas.

These early experiments showed us that science, and specifically, chemistry, can be interesting, and exciting.  On a small scale, many household chemical combinations can create dangerous reactions, as indicated on the warning labels.  On a larger scale, the chemical industry occupies one of the 16 sectors of critical infrastructure.  Every aspect of chemical production, use, transportation, and storage are covered as part of the chemical sector.

Chemical plants are susceptible to many physical hazards.  For example, some recent accidents indicate just how rapidly a minor problem can escalate to fatal proportions.  In early days of chemical production, some novel – and by today’s standards – comical devices, such as the single-legged chair for nitroglycerine operators, were invented to prevent chemical accidents.  Fortunately, mechanisms to protect chemical production have come a long way. 

Regulation and Protection

Today’s chemical plants are highly regulated.  Whether it is the production of inert or caustic chemicals, or intentionally explosive compounds such as gunpowder, numerous agencies oversee various aspects of chemical manufacturing.  There are even regulations governing the safe maritime, ground, air, and rail transportation of chemicals.

The protection of chemical plants and products also stretches into the cyber realm.  Chemical production, as well as the consumer products created from those chemicals, is a very exact science, and any tampering along the manufacturing chain can result in tainted, or harmful results.  Many product recalls are the results of unwanted compounds inadvertently added to consumer products.  From a systems security perspective, one has to wonder if these accidents are the result of oversight, or carelessness?  Either way, it would seem that some safety mechanisms were missed along the way.

With all of the automation that is used in the production of chemicals, the security of the systems controlling that automation is vital.  Beyond the automation controls, basic system configuration monitoring must be diligently observed.  The ability to detect an unwanted change in a chemical mixing system can be the early warning necessary to avert a disaster.

A great way to do this is by using a tool like Tripwire Enterprise to monitor the configuration of the automation controls in your organization. It is easy to setup a configuration policy to match the known good configuration of that automation system and monitor if there are any deviations to that policy. If the system ends up being changed, an administrator or operator can quickly assess the impact to the system and revert the change. Thus, minimizing damage and impact to the plant and everyone’s safety.  This can keep chemistry fun and exciting, and also safe.

The post ” Protecting Against Bad Chemistry (with Cybersecurity)” appeared first on TripWire

Source:TripWire – Irfahn Khimji

Tags: Cloud, Critical Severity, Goverment, Medium Severity, TripWire

Continue Reading

Previous Microsoft Finds Critical Bugs in Pre-Installed Apps on Millions of Android Devices
Next EnemyBot Linux Botnet Now Exploits Web Server, Android and CMS Vulnerabilities

More Stories

  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

11 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities

14 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Data Breach
  • Vulnerabilities

Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries

20 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories

2 days ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

2 days ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign

2 days ago [email protected] (The Hacker News)

Recent Posts

  • China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
  • CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
  • Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
  • How Samsung Knox Helps Stop Your Network Security Breach
  • Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT