23 May 2022

79

Critical Infrastructure and a Cyberattack

Format: APA

Academic level: College

Paper type: Assignment

Words: 855

Pages: 3

Downloads: 0

With the increasing threat of terrorist attacks, most governments, especially in the developed countries, are aware of the vulnerability of the water systems to disaster and threats or cyber-attacks. The government of the United States has been on high alert after 9/11, and responsible agencies have maintained constant surveillance of the national infrastructure, water supply included to ward off any form of cyber-attack from terrorists. Cyberattacks on the water systems are not usually taken seriously compared to a similar attack on other infrastructure. However, the water system is essential, and it needs proper surveillance to prevent cyber-attacks.

Consequences of Cyber Attack on Water System

The availability of safe drinking water is a matter of public health and is essential to all human activity. Treated reated water supply means that the government can prevent the spread of waterborne diseases and maintain its citizens' general health (Maiolo & Pantusa, 2018). Consequently, it is a matter of economic importance to ensure a supply of clean drinking water while managing the wastewater through the treatment process. As a result, a cyber-attack on the water management system can have a far-reaching impact. The impact of hacking the water system of any country depends on the motive of the attackers. Some hackers may break into the system to steal information to make a further targeted attack or sell information for financial gains crimes (Clark et al., 2017). The selling of hacked information is a serious issue considering the confidentiality that government agencies must maintain concerning people's details.

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

In many instances, hacking incidences result in panic and fear among the people. This is usually the case when hackers try to release contaminated water to the people (Clark et al., 2017). Sometimes they may jam the system to deny access or even destroy it altogether. These actions can cause huge losses to the responsible agencies and result in a public health crisis with the release of contaminated water. Sometimes, hackers can destroy system database parameters that negatively impact the integrity of the water supply and treatment system (Clark et al., 2017). Worse still, they can turn on water pumps leading to the overflowing of tanks and causing huge water losses.

The Interconnectedness of all Critical Infrastructure

Critical infrastructure is a “system and asset whether physical or virtual, so vital to the nation that the incapacity or destruction of that system would have a debilitating impact on security, national economic security or national public health or the safety of any combination of these matters (Maniscalco & Christen, 2011).” In the USA, there are 18 sectors identified as critical infrastructure. Apart from the water supply, others include agriculture and food, energy, and healthcare, just to mention a few. The critical infrastructure systems are interdependent, indicating connections among the physical facilities, customers, and services. The term interconnectedness is used to imply formal linkage between two separate systems. On the other hand, the term interdependence implies a deeper relationship where systems are not just connected but depend on each other. Water supply infrastructure is interconnected connected to healthcare supply infrastructure. The availability of clean water is crucial for public health and public health is also crucial for economic infrastructure because people have to be in good health to work.

DHS Actions to Ensure Resiliency

Department of Homeland Security has partnered with the US Environmental Protection Agency to protect water systems from cybercrimes (Clark et al., 2017). Under this partnership, several guidelines and techniques have been formulated as a countermeasure to cyber-attack and reduce vulnerability to the same. The DHS also created the Critical-Infrastructure Cyber Community (C3) Voluntary Program as a collaboration to raise awareness and the utilization of the NIST Cybersecurity structure. The program is designed for participants in the water sector with the DHS and other government agencies to provide resources to help in the management of cybersecurity risks (Clark et al., 2017). 

Future Measures

To be a step ahead of the hackers posing cybersecurity threats to the water management systems, there is a need for a cybersecurity culture. According to Enescu (2019), many people involved in direct management of water infrastructure using technology do not have enough knowledge of information technology, and cybersecurity defense. People need to be informed and organizations must have cybersecurity countermeasures in their strategic plans. Government organizations should also look into the segmentation of networks and the use of firewalls. Segmentation and creating network boundaries allows an organization to carry out protective and detective controls within the infrastructure. Organizations should ensure that they use strong passwords, consider other access control measures, and change default passwords (Yıldırım & Mackie, 2019). Strong passwords will help in keeping the systems and the information safe. The systems should be upgraded regularly because of the increasingly targeted attacks over the past few years.

The availability of clean water is crucial for public health and public health is also crucial for economic infrastructure because people have to be in good health to work. The water system is essential and any attack can have rippling effects on several sectors and infrastructure. The most important interconnectedness is between water and healthcare infrastructure. Without clean water, healthcare is in jeopardy and the population is at risk of various healthcare problems. The way forward is for government agencies and concerned organizations to constantly improve their cybersecurity infrastructure to remain ahead of the game, keep the water supply intact, and ensure safe water.

References

Clark, R. M., Panguluri, S., Nelson, T. D., & Wyman, R. P. (2017). Protecting drinking water utilities from cyberthreats.  Journal of the American Water Works Association 109 (INL/JOU-16-39302).

Enescu, S. (2019). The concept of cybersecurity culture. In  The Fourth Annual Conference of the National Defence College Romania in the New International Security Dynamics  (pp. 176-191). ” Carol I” National Defence University Publishing House.

Maiolo, M., & Pantusa, D. (2018). Infrastructure Vulnerability Index of drinking water systems to terrorist attacks.  Cogent Engineering 5 (1), 1456710.

Top of Form

Maniscalco, P. M., & Christen, H. T. (2011).  Homeland security: Principles and practice of terrorism response . Jones and Bartlett Publishers: New York.

Bottom of Form

Yıldırım, M., & Mackie, I. (2019). Encouraging users to improve password security and memorability.  International Journal of Information Security 18 (6), 741-759.

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). Critical Infrastructure and a Cyberattack.
https://studybounty.com/critical-infrastructure-and-a-cyberattack-assignment

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

The 1931 Central China Flood

The country of China was a vibrant agricultural hub in the early 18th century. The agriculturists cultivated on every available fertile piece of land. Their activities disrupted wetlands and Nanyang trees were felled...

Words: 625

Pages: 2

Views: 143

2009 Washington DC Metro Train Collision

The 22 nd of June 2009 saw the collision of two southbound Red Line Washington Metro trains. The total number of casualties was nine with tens of others being injured. According to DC Metro, the cause of the accident...

Words: 554

Pages: 2

Views: 80

Comparing and Contrasting the Rural, Urban, and Insurgent Models of Terrorism

In the purest sense, the term terrorism refers to the application of intentional brutality and violence, in general against unarmed civilians, mainly for political reasons. The term was coined during the French...

Words: 325

Pages: 1

Views: 518

Understanding Response and Recovery

The emergency management system will have to change the response and recovery protocols for better response to an emergency. The changes in the system will entail new official organizations and primed plans for...

Words: 374

Pages: 1

Views: 209

Why Radicalization Fails: Barriers to Mass Casualty Terrorism

Radicalization is a concept that refers to the gradual social processes used to explain changes in behaviours or ideas. There is a clear distinction between behavioural and cognitive dimensions of...

Words: 1951

Pages: 7

Views: 134

Information Sharing and Collaboration: Department of Homeland Security

The Department of Homeland Security (DHS) has many intelligence agencies used for protecting American citizens. The various agencies should collaborate by sharing information to combat threats to Americans....

Words: 307

Pages: 1

Views: 62

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration