As a result, remote access to government information system resources should be considered a priori untrusted, not subject to current information security policies, and with a significantly increased surface area for cyberattacks. At the same time, Vitaly Lyutikov noted, state-owned companies have not made any threat model adjustments related to the transition to remote work. It is impossible to rely solely on administrative measures to ensure information security for remote work due to the lack of control over their implementation. Solutions aimed at mitigating new threats have been developed jointly with the Ministry of Digital Development, Communications and Mass Media.
government agencies rarely have deeply layered information security protection, they are limited to a minimum set of protection tools, their infrastructure is not ready to mitigate new threats. This problem remains relevant. With regard to critical information infrastructure facilities, FSTEC has developed a draft of requirements for ensuring information security during remote access. Remote access information security tools will have to be certified for compliance with these requirements. In the near future, the draft will be submitted to the FSTEC Director for approval.
— So, can this case be considered a failed terrorist attack?
- Yes.
— How is the alkali level in water monitored?
- With the help of the main computer. It is belgium whatsapp data for the water purification system.
- I would like to see.
- Undoubtedly.
Two hours passed.
— Who installed TeamViewer on the computer that controls the water purification system?
— Our system administrator did this with the permission of the department manager. He was tired of coming here every day and checking if everything was okay.
- Idiots. Both of them! What password was set on this computer for remote access?