Cybersecurity and Infrastructure Protection
By M. Scott Burns and Jane LeClair
()
About this ebook
Related to Cybersecurity and Infrastructure Protection
Related ebooks
The Cybersecurity Mindset: Cultivating a Culture of Vigilance Rating: 0 out of 5 stars0 ratingsLandscape of Cybersecurity Threats and Forensic Inquiry Rating: 0 out of 5 stars0 ratingsEasy Steps to Managing Cybersecurity Rating: 0 out of 5 stars0 ratingsThe Five Anchors of Cyber Resilience: Why some enterprises are hacked into bankruptcy, while others easily bounce back Rating: 0 out of 5 stars0 ratingsCybersecurity for Small Businesses and Nonprofits Rating: 0 out of 5 stars0 ratingsIT Governance Critical Issues Series: Cyber Security Rating: 0 out of 5 stars0 ratingsManaging Cybersecurity Risk: Cases Studies and Solutions Rating: 0 out of 5 stars0 ratingsCyber Security: Essential principles to secure your organisation Rating: 0 out of 5 stars0 ratingsNIST Cybersecurity Framework: A pocket guide Rating: 0 out of 5 stars0 ratingsA concise introduction to the NIS Directive: A pocket guide for digital service providers Rating: 0 out of 5 stars0 ratingsDefense in Depth: An Impractical Strategy for a Cyber-World Rating: 5 out of 5 stars5/5Cyber Security Consultants Playbook Rating: 0 out of 5 stars0 ratingsTrends In Cybersecurity: The Insider To Insider Risks Rating: 0 out of 5 stars0 ratingsCybersecurity for Healthcare Professionals Rating: 0 out of 5 stars0 ratingsIT Security Concepts Rating: 5 out of 5 stars5/5The Little Book of Cybersecurity Rating: 0 out of 5 stars0 ratingsTargeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware Rating: 5 out of 5 stars5/5The Language of Cybersecurity Rating: 5 out of 5 stars5/5The Cybersecurity Maturity Model Certification (CMMC) – A pocket guide Rating: 0 out of 5 stars0 ratingsBuilding a Practical Information Security Program Rating: 5 out of 5 stars5/5The Ransomware Threat Landscape: Prepare for, recognise and survive ransomware attacks Rating: 0 out of 5 stars0 ratingsBuilding an Information Security Awareness Program: Defending Against Social Engineering and Technical Threats Rating: 0 out of 5 stars0 ratingsBe Cyber Secure: Tales, Tools and Threats Rating: 0 out of 5 stars0 ratingsProtecting Our Future, Volume 1: Educating a Cybersecurity Workforce Rating: 0 out of 5 stars0 ratingsLessons Learned: Critical Information Infrastructure Protection: How to protect critical information infrastructure Rating: 0 out of 5 stars0 ratingsCyber-Physical Attacks: A Growing Invisible Threat Rating: 4 out of 5 stars4/5The Human Fix to Human Risk: 5 Steps to Fostering a Culture of Cyber Security Awareness Rating: 0 out of 5 stars0 ratingsCyber Attacks: Protecting National Infrastructure Rating: 4 out of 5 stars4/5Cyber Security and Policy: A substantive dialogue Rating: 0 out of 5 stars0 ratings
Computers For You
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution Rating: 4 out of 5 stars4/5The Invisible Rainbow: A History of Electricity and Life Rating: 4 out of 5 stars4/5CompTIA Security+ Practice Questions Rating: 2 out of 5 stars2/5Elon Musk Rating: 4 out of 5 stars4/5Slenderman: Online Obsession, Mental Illness, and the Violent Crime of Two Midwestern Girls Rating: 4 out of 5 stars4/5101 Awesome Builds: Minecraft® Secrets from the World's Greatest Crafters Rating: 4 out of 5 stars4/5Deep Search: How to Explore the Internet More Effectively Rating: 5 out of 5 stars5/5Standard Deviations: Flawed Assumptions, Tortured Data, and Other Ways to Lie with Statistics Rating: 4 out of 5 stars4/5The ChatGPT Millionaire Handbook: Make Money Online With the Power of AI Technology Rating: 4 out of 5 stars4/5SQL QuickStart Guide: The Simplified Beginner's Guide to Managing, Analyzing, and Manipulating Data With SQL Rating: 4 out of 5 stars4/5CompTIA IT Fundamentals (ITF+) Study Guide: Exam FC0-U61 Rating: 0 out of 5 stars0 ratingsProcreate for Beginners: Introduction to Procreate for Drawing and Illustrating on the iPad Rating: 0 out of 5 stars0 ratingsThe Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5The Professional Voiceover Handbook: Voiceover training, #1 Rating: 5 out of 5 stars5/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5Mastering ChatGPT: 21 Prompts Templates for Effortless Writing Rating: 5 out of 5 stars5/5Grokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5Dark Aeon: Transhumanism and the War Against Humanity Rating: 5 out of 5 stars5/5Going Text: Mastering the Command Line Rating: 4 out of 5 stars4/5Creating Online Courses with ChatGPT | A Step-by-Step Guide with Prompt Templates Rating: 4 out of 5 stars4/5How to Create Cpn Numbers the Right way: A Step by Step Guide to Creating cpn Numbers Legally Rating: 4 out of 5 stars4/5People Skills for Analytical Thinkers Rating: 5 out of 5 stars5/5Alan Turing: The Enigma: The Book That Inspired the Film The Imitation Game - Updated Edition Rating: 4 out of 5 stars4/5ChatGPT Ultimate User Guide - How to Make Money Online Faster and More Precise Using AI Technology Rating: 0 out of 5 stars0 ratings
Reviews for Cybersecurity and Infrastructure Protection
0 ratings0 reviews
Book preview
Cybersecurity and Infrastructure Protection - M. Scott Burns
you.
Chapter 1
Introduction
The security of the data in our digital systems has dominated conversations throughout the cyber community in recent years. This conversation is prompted by the ongoing and escalating series of digital breaches that have affected business organizations, learning institutions, healthcare facilities, and government agencies. Hardly a week goes by that the media does not report on yet another cyber breach costing millions of dollars, which exposes personally identifying information (PII), and sullies the reputation of yet another organization or agency. Last year, according to some reports, there were over 40 million cyber-attacks, averaging over 100,000 per day—an increase of nearly 50 percent from the previous year (Bennett, 2014). The level of attacks in 2015 seem to be outpacing even that. In one attack alone on a government agency in the United States in early 2015, over 22 million records were stolen and tens of millions of records were lost during hacks of several healthcare services (Granville, 2015). The financial costs of these digital breaches are staggering. According to well-known U.K. insurer Lloyd’s, cyber-attacks are costing organizations over 400 billion dollars each year, and those costs are rising. These high-profile cyber breaches highlighted in the media gain a good deal of public attention, especially if—as with the SONY breach in 2014—there are celebrities involved (Gandel, 2015).
While the reports of such attacks are meaningful, as they tend to educate and alert the general public to the ongoing threats to our security, they often neglect a more important aspect—the cyber threats and attacks to our critical infrastructure, the foundations of which keep our society functioning. While we are inconvenienced when our credit card services are disrupted, or troubled at the prospect of our health records being made public, we fail to recognize the devastating impact to our society should a cyber-attack suddenly cut off our water supply, electricity, or other services we count on in our daily lives. Although they receive less media attention, attacks on our critical infrastructure are a serious concern. According to a recent survey, almost 90 percent of managers in critical sectors report attacks on their organizations, and nearly 50 percent believe it is likely that a cyber-attack on critical infrastructure within the next five years will result in the loss of lives. Our critical infrastructure is being attacked by those with malicious intent and is, by some accounts, more vulnerable than many believe. It must be protected.
In this book we will examine the 16 critical infrastructure sectors and how each has its own importance yet is strategically intertwined with others. We will also examine what the threats to these sectors are, who might be attacking them, how those attacks might take place, the measures that are being taken to protect them, and the governance that seeks to regulate that protection.
A Brief Review of Critical Infrastructure Protection
The nation’s critical infrastructure provides the essential services that underpin American society and serves as the backbone of our nation’s economy, security, and health. We know it as the power we use in our homes, the water we drink, the transportation that moves us, the stores we shop in, and the communication systems we rely on to stay in touch with friends and family.
—United States Department of
Homeland Security
As identified by the United States government through Presidential Policy Directive 21 (PPD-21): Critical Infrastructure Security and Resilience,
there are 16 Critical Infrastructures. Listed alphabetically, they are: (1) the Chemical Sector, (2) the Commercial Facilities Sector, (3) the Communications Sector, (4) the Critical Manufacturing Sector, (5) the Dams Sector, (6) the Defense Industrial Base Sector, (7) the Emergency Services Sector, (8) the Energy Sector, (9) the Financial Services Sector, (10) the Food and Agriculture Sector, (11) the Government Facilities Sector, (12) the Healthcare and Public Health Sector, (13) the Information Technology Sector, (14) the Nuclear Reactors, Materials, and Waste Sector, (15) the Transportation Systems Sector, and (16) the Water and Wastewater Systems Sector (U.S. Department