The technology era has opened up many opportunities and worked to speed up globalization. However, even with the opportunities, there are other disadvantages that have cropped up thanks to technological advancement. A notable negative impact of technological advancement is cyber-attacks. Cyber-attacks have been described as deliberate and malicious attempts by individuals or organizations to breach the information systems of other organizations or individuals with the objective of the attacker getting some benefits from the disruptions (Taylor, Fritsch & Liederbach, 2015).
America has been a target of cyber-attacks with attackers in many cases seeking ransom or obliterating data and systems. Cyber-attacks directed at American systems involve malware that is malicious software that disrupts systems making them inoperable. Additionally, phishing forms another form of cyber-attacks that are most common in American computer systems.
Delegate your assignment to our experts and they will do the rest.
A deficit in cybersecurity expertise
There are several reasons that have been floated as being the reasons behind America being more vulnerable to cyber-attacks than any other country in the world. First, cybersecurity talent has been shown to be very low not only in America but also globally ( Blokdyk, 2018) . Specialized expertise is required to design, implement, and maintain systems that are secure. Therefore, with limited expertise, it has become easy for anyone to launch an attack on systems coupled with the fact that it has become relatively easy to acquire malicious software form the dark web to launch attacks.
Complacency
Another significant factor that has been cited as making America more vulnerable to cyber-attacks is complacency ( Blokdyk, 2018) . While people and organizations are well aware of the damages that cyber-attacks pose to their operations, few have taken the adequate precautionary measures to thwart potential attacks. There is a general tendency of organizations not to update operating software as well as employing the use of antivirus software making systems vulnerable to cyber-attacks.
Limited viable deterrents
Studies are pointing out that America is having limited viable deterrents for keeping belligerents from launching attacks on American systems. Unlike in military strength where few countries in the world can match America, cyber warfare has proven to level quickly noting that any country can launch an attack. Further research shows that even though America can retaliate and mount its own cyber-attacks there proves to be little that can actually be done to prevent worse retaliations ( Moallem, 2018) . Often, diplomacy, as well as economic sanctions, have been shown as the most effective deterrents but in most cases only when there is significant economic parity between the countries involved. For example, Russia has continued cyber-attacks on American systems despite many sanctions in addition to the country having many ways to retaliate should America launch its own cyber-attacks on Russia.
Critical infrastructure under threat
Electricity infrastructure
While previously critical infrastructure was viewed as being secure from cyber-attacks, recent studies are suggesting otherwise ( Moallem, 2018) . One of the critical infrastructures under the immense danger of attack is the electricity infrastructure. Reports of an attack to a New York dam have been made with attackers succeeding in accessing core command-and-control systems at the dam using a cellular modem. Such attacks on power dams have resulted in power outages to critical facilities such as hospitals that are utilizing electrical power to run patients’ health records as well as machines used in offering critical care.
Nuclear power plants
Another critical infrastructure that is facing imminent danger from cyber-attacks is the nuclear power plants. In the recent past, there have been attacks meted on nuclear power plants such as the "Wolf Creek Nuclear Operating Corporation" in Kansas that came under attack. Most notably, a spear phishing attack was employed targeting persons with access to the plant's critical control.
Healthcare facilities
Hospitals and healthcare facilities have not been left out in the list of critical infrastructures that have been targeted by cyber attackers. Noting that such facilities are utilizing information technology systems to run basic office functions as well as operating physical equipment, the challenge of cyber-attacks can never be more real.
The consequence of security breaches on critical infrastructure
There are numerous consequences of security breaches, especially on critical infrastructure. Hacking into nuclear power plants poses an immense risk such as the risk of potential enemies taking control of nuclear facilities. When the enemy assumes such control, there is a threat to weaponize such critical infrastructure against the nation which would lead to farfetched destruction not only in the present but also in the future.
Noting that electricity generation is critical on commerce as well as facilitating the running of critical facilities, scathing attacks on such infrastructure has the potential of hurting business ( Blokdyk, 2018) . The facilities such as hospitals, train services that rely on electricity to run can record accidents as well as deaths from cyber-attacks. Additionally, there is a risk of patient records being inaccessible which would compromise service delivery in healthcare facilities. Moreover, casualties are bound to be recorded resulting from wrong medication in facilities dependent on information systems to provide prescriptions.
References
Blokdyk, G. (2018). Cybersecurity Risk Management a Complete Guide - 2019 Edition . 5starcooks.
Moallem, A. (2018). Human-Computer Interaction and Cybersecurity Handbook . Boca Raton, FL: CRC Press.
Taylor, R., Fritsch, E., & Liederbach, J. (2015). Digital crime and digital terrorism (4th ed., pp. 49-71). Upper Saddle River, NJ: Pearson/Prentice Hall