NASA has located more than 6.000 cyber security incidents in the last four years, according to a report released by the Office of the Inspector General of NASA. The space service has large attack surface due to the presence of approx 3.000 websites and more than 42.000 accessible to the public data. The control carried out by the inspector general of NASA, revealed that the organization has more than 4.400 applications, over 15.000 mobile devices, about 13.000 software licenses, nearly 50.000 computers and 39.000 TB of data.
Specifically, the report published by the Office of the Inspector of NASA states the following: "Cyber security incidents at NASA can affect national security, intellectual property and individuals whose data could be lost or compromised. In cybersecurity, an attacker is a path or means by which an attacker gains unauthorized access to a computer or network - for example, via email, websites, or external / removable media. "Once a malicious agent gains access, it can exploit system vulnerabilities, gain access to sensitive data, install various types of malware and launch cyber attacks."
Cyberattacks against body systems are not uncommon. Malicious agents could try to steal critical information with sophisticated companies and for this reason, it is important to locate and mitigate them by the organization.
NASA has identified 1.785 cyber security incidents in 2020, including brute-force attacks, email-related attacks, impersonation attacks, system misappropriation, equipment loss / theft, and cyber-attacks.
In 2020, most of the incidents discovered were misuse issues, followed by equipment loss / theft and cyber attacks.
"The cyber threat to NASA's Internet-based computer networks intrusions, is expanding in scope and frequency and the success of these intrusions demonstrates the increasingly complex nature of the cyber security challenges facing the Organization. In simple terms, to date the Agency's security procedures are very often ineffective in staying ahead of the dynamic threat landscape. " the report points out.
Between important findings mentioned in the report include the following:
• NASA did not have a risk management framework at the level of the Information Security Agency or an information security architecture.
• There are weaknesses in NASA's internal controls and risk management practices.
• The Security Operations Center lacks visibility for information security management, incident detection, and the restoration of NASA's entire IT infrastructure.
• NASA's cybersecurity program remained ineffective at level 2 out of 5, which means that the Agency has not consistently implemented policies and procedures that define its security program.
• NASA does not adequately control the business rules necessary to grant access to mobile device management on its network.
Source of information: securityaffairs.co