Which ones are immune to attack?When all it takes to STOP an attack is the simple removal of an RJ-45 connector from a router in a rack? (This begs the question: How is the beginning of an attack recognized? This also overlooks how rules are implemented in routers providing service from access points to 'the cloud' serve to limit what IP addys are allowed access to private physical networks.)
You ppl make any sort of defense or active countermeasures sound impossible ... (notwithstanding the use of VPNs, private physical networks et al)
Don't you ppl subscribe to anything like Network World or pay attention to what vendors offer in the way of routers and traffic screening/filtering? Don't make the mistake of projecting your network practices onto others in the real world ...
Yep.
If the first act is to spoof the system into reporting everything is normal no one will have the information warning them now would be a good time to unplug the routers.
Compare to the mid-Atlantic Air France crash.
The crew believed their readouts and stalled the Airbus every inch of 30,000 ft to the water.
That was an accident caused by iced-over pitot tubes, would the outcome have been different if the pitot tubes were clear, but a deliberate act of malware fed false data to the crew?
Are you saying that no one anywhere on earth is clever enough to figure out a way to deliberately feed false data to a control center?
Are you saying that even if they could spoof, say, the Texas grid, they couldn’t possibly spoof the other two?
That’s going to be a hard sell.