search.noResults

search.searching

saml.title
dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
YOUR BEST PRACTICE


Preventing irrigation 


L


ast April, irrigation systems were disrupted in Israel in a cyberattack that once again demonstrates the


threats faced by industrial control systems. As reported in numerous industry and mainstream media outlets, hackers targeted water controllers for irrigation systems at farms in the Jordan Valley, as well as wastewater treatment control systems belonging to the Galil Sewage Corporation. Farms were warned by Israel’s National Cyber Directorate prior to the incident, being instructed to disable remote connections to these systems due to the high risk of cyberattacks. Roughly a dozen farms in the Jordan Valley and other areas failed to do so and had their water controllers hacked. This led to automated irrigation systems being temporarily disabled, forcing farmers to turn to manual irrigation.


The attackers targeted programmable logic controllers. Information about these controllers, like many controllers by other manufacturers, including default passwords and configuration options, is available online, and the devices run various software components that can also be targeted by hackers. The impacted farms likely left their ICS exposed to the


28 Irrigation TODAY | Winter 2024


internet and may have also used weak or default passwords, allowing hackers to easily gain access and cause disruption.


These attacks illustrate how easy it can be to hack industrial systems due to many organizations failing to implement even the most basic security measures, such as changing default passwords and leaving unprotected systems exposed to the internet.


DIGITAL AGRICULTURE AND CYBERSECURITY THREATS


Today, farmers and agriculturalists can harness the power of technology to optimize water usage, conserve resources and increase productivity.


The future of farming is advanced technology and already there are many examples of technologies controlled by smart devices and computer systems. However, as farms and farm equipment become connected, farmers must consider and plan for the operational risks of interference with networks and Internet of Things devices providing data. With the increasing reliance on technology in agriculture, the risk of cyberattacks


By Cody Bann


on these systems has also risen, which can have serious implications for the agricultural industry.


Because food and agriculture are critical sectors of our economy and livelihood, if they’re compromised the ramifications could be immense. This was the impetus for Pacific Northwest National Laboratory creating the Food and Agriculture Risk Modeling project, which includes a team of data scientists, cybersecurity experts and researchers with agriculture and food backgrounds.


According to Mary Lancaster, who leads the FARM project, cyberattacks not only affect the environment and livestock but can cause harm to humans too. “This is a huge problem space that no one else is addressing, but we’re making progress.”


As a result of introducing IoT and connected infrastructure to farms, the agriculture sector will develop new ways to manage and improve operations. However, incorporating IoT systems to the sector amplifies various cyber risks, as Israel experienced with the irrigation attack. Cyberattacks on smart farming infrastructure, like irrigation systems,


irrigationtoday.org


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40