SlideShare a Scribd company logo
1 of 4
Download to read offline
The Biggest Cyber and Physical Security
Threats to Critical Infrastructure
Introduction: Critical infrastructure refers to the systems, facilities, and networks that are
essential to the functioning of a society and its economy. These are the assets that, if damaged or
disrupted, could have a significant impact on public health and safety, economic security, and
national security.
Examples of critical infrastructure include:
1. Energy systems (power plants, oil and gas refineries, pipelines)
2. Transportation systems (highways, bridges, airports, railways, ports)
3. Communication systems (telecommunications, internet, data centers)
4. Water and wastewater systems (dams, reservoirs, treatment plants)
5. Financial systems (banks, stock exchanges, payment systems)
6. Emergency services (police, fire, and ambulance services)
7. Healthcare systems (hospitals, clinics, medical supply chains)
Of the many cyber and physical security threats to critical infrastructure here are some key ones:
1. Malware and ransomware attacks: Malicious software can infiltrate a system and cause
damage or disruption to operations, and ransomware can encrypt files and demand payment in
exchange for the decryption key.
There have been several high-profile ransomware attacks on critical infrastructure in recent
years, including attacks on energy and water utilities, transportation systems, and healthcare
providers. Some recent statistics on ransomware attacks on critical infrastructure:
 In 2020, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) reported a
significant increase in ransomware attacks on industrial control systems (ICS) and critical
infrastructure. These attacks involved a range of sectors, including manufacturing,
energy, and transportation.
 According to a report by cybersecurity firm Dragos, there were at least five ransomware
attacks on operational technology (OT) networks in 2020, including attacks on energy
and manufacturing companies. Dragos also said in February 2023 that ICS/OT
ransomware attacks are up 87%.
 The 2021 Data Breach Investigations Report by Verizon found that ransomware was
involved in 10% of all data breaches in the public sector, which includes critical
infrastructure organizations.
 In May 2021, the Colonial Pipeline, which supplies fuel to much of the eastern United
States, was hit by a ransomware attack that caused a temporary shutdown of its
operations. This incident highlighted the vulnerability of critical infrastructure to cyber
attacks.
 According to a report by cybersecurity company CrowdStrike, the number of ransomware
attacks on critical infrastructure increased by 158% in the first half of 2021 compared to
the same period in 2020.
 According to the 2023 CrowdStrike Global Threat Report, eCrime actors moving beyond
ransom payments for monetization – 2022 saw a 20% increase in the number of
adversaries conducting data theft and extortion campaigns. China-nexus espionage surged
across all 39 global industry sectors and 20 geographic regions tracked by CrowdStrike
Intelligence – Rise in China-nexus adversary activity shows that organizations across the
world and in every vertical must be vigilant against the threat from Beijing.
2. Insider threats: Malicious insiders can use their access to cause damage or steal sensitive
information. Here are some famous examples of cybersecurity insider threats that have
succeeded in causing damage:
 Edward Snowden: In 2013, Snowden, a former contractor for the U.S. National Security
Agency (NSA), leaked classified documents to the media that revealed the extent of the
agency's surveillance activities. The leak caused widespread controversy and prompted
changes in how the U.S. government conducts surveillance.
 Harold Martin: In 2016, Martin, a former contractor for the NSA, was arrested for
stealing classified information from the agency. He was found to have taken terabytes of
data over a period of two decades, including highly sensitive information about U.S.
intelligence capabilities.
 Chelsea Manning: In 2010, Manning, a former U.S. Army soldier, leaked classified
documents to Wikileaks that included diplomatic cables, military reports, and other
sensitive information. Manning was convicted of espionage and other charges and
sentenced to 35 years in prison, although her sentence was later commuted by President
Barack Obama.
 Harold T. Martin III: In 2020, Martin, a former contractor for the National Security
Agency (NSA), was sentenced to nine years in prison for stealing classified information
from the agency. The stolen data included hacking tools and other sensitive information
that Martin had stored on his personal devices.
3. Physical attacks: Physical attacks on critical infrastructure, such as sabotage or destruction
of equipment, can also pose significant cybersecurity risks. Examples include:
 Sabotage: This involves intentionally damaging or destroying critical infrastructure
assets, such as by planting explosives near a key bridge or dam.
 Theft: This involves stealing critical infrastructure assets or materials, such as copper
wiring from a power substation or fuel from an oil refinery.
 Vandalism: This involves damaging or defacing critical infrastructure assets, such as by
graffiti or destruction of communication lines.
Physical attacks on critical infrastructure can have serious consequences, including loss of life,
environmental damage, and economic disruption. It's important for organizations responsible for
critical infrastructure to have physical security measures in place to prevent and respond to
physical attacks. These measures may include surveillance cameras, physical barriers, access
controls, and emergency response plans.
4. Social engineering: This involves manipulating people into divulging sensitive information
or taking actions that compromise security. Phishing is a primary example of such manipulation
and is still one of the most prevalent types of attack. According to the 2021 Data Breach
Investigations Report by Verizon, phishing was involved in 36% of all data breaches, making it
the top threat action in the report.
Phishing attacks are also becoming increasingly sophisticated and targeted, with attackers using
social engineering tactics to trick victims into divulging sensitive information or downloading
malware. This can include impersonating trusted individuals or organizations, creating
convincing fake websites or emails, and using urgent or threatening language to pressure victims
into taking action.
According to the 2021 State of the Phish Report by Proofpoint, 75% of organizations surveyed
reported being targeted by phishing attacks in 2020, and 59% of those attacks were successful in
compromising at least one user account or system. The report also found that COVID-19 related
phishing attacks were particularly prevalent in 2020, taking advantage of the pandemic to trick
victims into providing personal information or downloading malware.
5. Distributed denial of service (DDoS) attacks: These attacks flood a system with traffic,
overwhelming it and causing it to crash or become unavailable.
6. Advanced persistent threats (APTs): APTs are sophisticated, long-term attacks that target
specific organizations and can involve multiple stages of infiltration and exfiltration.
According to the 2023 CrowdStrike Global Threat Report, An uptick in social engineering tactics
targeting human interactions – Tactics such as vishing direct victims to download malware and
SIM swapping to circumvent multi-factor authentication (MFA).
Epilogue: If you have thoughts and ideas on how to improve security for critical infrastructure I
would love to hear them. In the meantime, here is a presentation on why power plants are
particularly vulnerable to cyber threats. https://www.youtube.com/watch?v=rCG-WaLGFQw

More Related Content

Similar to The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM May 2023.pdf

Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookMargarete McGrath
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsDavid Sweigert
 
Cyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsCyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsKory Edwards
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docxalinainglis
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityAndrea Rossetti
 
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYTHE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYijcsit
 
Cyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsCyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsKory Edwards
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecuritySpark Security
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionWilliam McBorrough
 
Protect the Unexpected
Protect the UnexpectedProtect the Unexpected
Protect the UnexpectedCharles Mok
 
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryWhat Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryCR Group
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxericbrooks84875
 
Digital danger zone tackling cyber security
Digital danger zone tackling cyber securityDigital danger zone tackling cyber security
Digital danger zone tackling cyber securityJohn Kingsley
 
Digital danger zone tackling cyber security
Digital danger zone tackling cyber securityDigital danger zone tackling cyber security
Digital danger zone tackling cyber securityiFluidsEng
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docxrtodd599
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemLillian Ekwosi-Egbulem
 

Similar to The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM May 2023.pdf (20)

C018131821
C018131821C018131821
C018131821
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standards
 
Cyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsCyber Threat to Public Safety Communications
Cyber Threat to Public Safety Communications
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYTHE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
 
The Professionalization of the Hacker Industry
The Professionalization of the Hacker IndustryThe Professionalization of the Hacker Industry
The Professionalization of the Hacker Industry
 
Cyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsCyber Threat to Public Safety Communications
Cyber Threat to Public Safety Communications
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for Cybersecurity
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
Protect the Unexpected
Protect the UnexpectedProtect the Unexpected
Protect the Unexpected
 
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryWhat Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 
Digital danger zone tackling cyber security
Digital danger zone tackling cyber securityDigital danger zone tackling cyber security
Digital danger zone tackling cyber security
 
Digital danger zone tackling cyber security
Digital danger zone tackling cyber securityDigital danger zone tackling cyber security
Digital danger zone tackling cyber security
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docx
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
 

More from Fas (Feisal) Mosleh

Robotics for Power Plants with IBM and Certrec Webinar Presentation V6.pdf
Robotics for Power Plants with IBM and Certrec Webinar Presentation V6.pdfRobotics for Power Plants with IBM and Certrec Webinar Presentation V6.pdf
Robotics for Power Plants with IBM and Certrec Webinar Presentation V6.pdfFas (Feisal) Mosleh
 
WHITE PAPER - The Importance of CIP in the Energy Sector v2.0.pdf
WHITE PAPER - The Importance of CIP in the Energy Sector v2.0.pdfWHITE PAPER - The Importance of CIP in the Energy Sector v2.0.pdf
WHITE PAPER - The Importance of CIP in the Energy Sector v2.0.pdfFas (Feisal) Mosleh
 
Brief introduction to NoSQL by fas mosleh
Brief introduction to NoSQL by fas moslehBrief introduction to NoSQL by fas mosleh
Brief introduction to NoSQL by fas moslehFas (Feisal) Mosleh
 
Introduction to virtual desktop infrastructure v3
Introduction to virtual desktop infrastructure  v3Introduction to virtual desktop infrastructure  v3
Introduction to virtual desktop infrastructure v3Fas (Feisal) Mosleh
 
Joint gtm for software and systems technologies
Joint gtm for software and systems technologiesJoint gtm for software and systems technologies
Joint gtm for software and systems technologiesFas (Feisal) Mosleh
 
Hq camera avago ee times article v2
Hq camera    avago ee times article v2Hq camera    avago ee times article v2
Hq camera avago ee times article v2Fas (Feisal) Mosleh
 
Agilent technologies announces innovative image pipe for camera phones
Agilent technologies announces innovative image pipe for camera phonesAgilent technologies announces innovative image pipe for camera phones
Agilent technologies announces innovative image pipe for camera phonesFas (Feisal) Mosleh
 
Mission critical linux white paper
Mission critical linux white paperMission critical linux white paper
Mission critical linux white paperFas (Feisal) Mosleh
 
Juldee IP and tech monetization v4 by ex-Hewlett-Packard Director of IP Fas M...
Juldee IP and tech monetization v4 by ex-Hewlett-Packard Director of IP Fas M...Juldee IP and tech monetization v4 by ex-Hewlett-Packard Director of IP Fas M...
Juldee IP and tech monetization v4 by ex-Hewlett-Packard Director of IP Fas M...Fas (Feisal) Mosleh
 
Syndicated Patent Deals = Supercharging the buying and selling of patents by ...
Syndicated Patent Deals = Supercharging the buying and selling of patents by ...Syndicated Patent Deals = Supercharging the buying and selling of patents by ...
Syndicated Patent Deals = Supercharging the buying and selling of patents by ...Fas (Feisal) Mosleh
 
Juldee Ventures - why si valley summary
Juldee Ventures  - why si valley summaryJuldee Ventures  - why si valley summary
Juldee Ventures - why si valley summaryFas (Feisal) Mosleh
 
Introduction to IP and technology licensing for technology executives by Fas ...
Introduction to IP and technology licensing for technology executives by Fas ...Introduction to IP and technology licensing for technology executives by Fas ...
Introduction to IP and technology licensing for technology executives by Fas ...Fas (Feisal) Mosleh
 
The value of patents the executives' perspective v3
The value of patents   the executives' perspective v3The value of patents   the executives' perspective v3
The value of patents the executives' perspective v3Fas (Feisal) Mosleh
 
Innovation & disruption hp talk april 2010 juldee version
Innovation & disruption hp talk april 2010 juldee versionInnovation & disruption hp talk april 2010 juldee version
Innovation & disruption hp talk april 2010 juldee versionFas (Feisal) Mosleh
 
Creative venturing creative funding v2 12 06-2013 for distribution
Creative venturing creative funding v2 12 06-2013 for distributionCreative venturing creative funding v2 12 06-2013 for distribution
Creative venturing creative funding v2 12 06-2013 for distributionFas (Feisal) Mosleh
 
Creative exits v3 10 20-2013 for distribution Fas Mosleh at OPEN Networking E...
Creative exits v3 10 20-2013 for distribution Fas Mosleh at OPEN Networking E...Creative exits v3 10 20-2013 for distribution Fas Mosleh at OPEN Networking E...
Creative exits v3 10 20-2013 for distribution Fas Mosleh at OPEN Networking E...Fas (Feisal) Mosleh
 
Why Acquire Patents? kanzatec summary 2013
Why Acquire Patents?   kanzatec summary 2013Why Acquire Patents?   kanzatec summary 2013
Why Acquire Patents? kanzatec summary 2013Fas (Feisal) Mosleh
 

More from Fas (Feisal) Mosleh (19)

Robotics for Power Plants with IBM and Certrec Webinar Presentation V6.pdf
Robotics for Power Plants with IBM and Certrec Webinar Presentation V6.pdfRobotics for Power Plants with IBM and Certrec Webinar Presentation V6.pdf
Robotics for Power Plants with IBM and Certrec Webinar Presentation V6.pdf
 
WHITE PAPER - The Importance of CIP in the Energy Sector v2.0.pdf
WHITE PAPER - The Importance of CIP in the Energy Sector v2.0.pdfWHITE PAPER - The Importance of CIP in the Energy Sector v2.0.pdf
WHITE PAPER - The Importance of CIP in the Energy Sector v2.0.pdf
 
Brief introduction to NoSQL by fas mosleh
Brief introduction to NoSQL by fas moslehBrief introduction to NoSQL by fas mosleh
Brief introduction to NoSQL by fas mosleh
 
Introduction to virtual desktop infrastructure v3
Introduction to virtual desktop infrastructure  v3Introduction to virtual desktop infrastructure  v3
Introduction to virtual desktop infrastructure v3
 
Joint gtm for software and systems technologies
Joint gtm for software and systems technologiesJoint gtm for software and systems technologies
Joint gtm for software and systems technologies
 
Hq camera avago ee times article v2
Hq camera    avago ee times article v2Hq camera    avago ee times article v2
Hq camera avago ee times article v2
 
Agilent technologies announces innovative image pipe for camera phones
Agilent technologies announces innovative image pipe for camera phonesAgilent technologies announces innovative image pipe for camera phones
Agilent technologies announces innovative image pipe for camera phones
 
Migrating from ibm to hpe
Migrating from ibm to hpeMigrating from ibm to hpe
Migrating from ibm to hpe
 
Mission critical linux white paper
Mission critical linux white paperMission critical linux white paper
Mission critical linux white paper
 
Juldee IP and tech monetization v4 by ex-Hewlett-Packard Director of IP Fas M...
Juldee IP and tech monetization v4 by ex-Hewlett-Packard Director of IP Fas M...Juldee IP and tech monetization v4 by ex-Hewlett-Packard Director of IP Fas M...
Juldee IP and tech monetization v4 by ex-Hewlett-Packard Director of IP Fas M...
 
Syndicated Patent Deals = Supercharging the buying and selling of patents by ...
Syndicated Patent Deals = Supercharging the buying and selling of patents by ...Syndicated Patent Deals = Supercharging the buying and selling of patents by ...
Syndicated Patent Deals = Supercharging the buying and selling of patents by ...
 
Juldee Ventures - why si valley summary
Juldee Ventures  - why si valley summaryJuldee Ventures  - why si valley summary
Juldee Ventures - why si valley summary
 
Introduction to IP and technology licensing for technology executives by Fas ...
Introduction to IP and technology licensing for technology executives by Fas ...Introduction to IP and technology licensing for technology executives by Fas ...
Introduction to IP and technology licensing for technology executives by Fas ...
 
The value of patents the executives' perspective v3
The value of patents   the executives' perspective v3The value of patents   the executives' perspective v3
The value of patents the executives' perspective v3
 
Innovation & disruption hp talk april 2010 juldee version
Innovation & disruption hp talk april 2010 juldee versionInnovation & disruption hp talk april 2010 juldee version
Innovation & disruption hp talk april 2010 juldee version
 
Creative venturing creative funding v2 12 06-2013 for distribution
Creative venturing creative funding v2 12 06-2013 for distributionCreative venturing creative funding v2 12 06-2013 for distribution
Creative venturing creative funding v2 12 06-2013 for distribution
 
Creative exits v3 10 20-2013 for distribution Fas Mosleh at OPEN Networking E...
Creative exits v3 10 20-2013 for distribution Fas Mosleh at OPEN Networking E...Creative exits v3 10 20-2013 for distribution Fas Mosleh at OPEN Networking E...
Creative exits v3 10 20-2013 for distribution Fas Mosleh at OPEN Networking E...
 
Upping valuation v2 9 30-2013
Upping valuation v2 9 30-2013Upping valuation v2 9 30-2013
Upping valuation v2 9 30-2013
 
Why Acquire Patents? kanzatec summary 2013
Why Acquire Patents?   kanzatec summary 2013Why Acquire Patents?   kanzatec summary 2013
Why Acquire Patents? kanzatec summary 2013
 

Recently uploaded

Reviewing and summarization of university ranking system to.pptx
Reviewing and summarization of university ranking system  to.pptxReviewing and summarization of university ranking system  to.pptx
Reviewing and summarization of university ranking system to.pptxAss.Prof. Dr. Mogeeb Mosleh
 
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, MumbaiPooja Nehwal
 
Day 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampDay 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampPLCLeadershipDevelop
 
Continuous Improvement Infographics for Learning
Continuous Improvement Infographics for LearningContinuous Improvement Infographics for Learning
Continuous Improvement Infographics for LearningCIToolkit
 
GENUINE Babe,Call Girls IN Baderpur Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Baderpur  Delhi | +91-8377087607GENUINE Babe,Call Girls IN Baderpur  Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Baderpur Delhi | +91-8377087607dollysharma2066
 
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceanilsa9823
 
internal analysis on strategic management
internal analysis on strategic managementinternal analysis on strategic management
internal analysis on strategic managementharfimakarim
 
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Pooja Nehwal
 
situational leadership theory by Misba Fathima S
situational leadership theory by Misba Fathima Ssituational leadership theory by Misba Fathima S
situational leadership theory by Misba Fathima Smisbafathima9940
 
Call Now Pooja Mehta : 7738631006 Door Step Call Girls Rate 100% Satisfactio...
Call Now Pooja Mehta :  7738631006 Door Step Call Girls Rate 100% Satisfactio...Call Now Pooja Mehta :  7738631006 Door Step Call Girls Rate 100% Satisfactio...
Call Now Pooja Mehta : 7738631006 Door Step Call Girls Rate 100% Satisfactio...Pooja Nehwal
 

Recently uploaded (20)

Imagine - Creating Healthy Workplaces - Anthony Montgomery.pdf
Imagine - Creating Healthy Workplaces - Anthony Montgomery.pdfImagine - Creating Healthy Workplaces - Anthony Montgomery.pdf
Imagine - Creating Healthy Workplaces - Anthony Montgomery.pdf
 
Reviewing and summarization of university ranking system to.pptx
Reviewing and summarization of university ranking system  to.pptxReviewing and summarization of university ranking system  to.pptx
Reviewing and summarization of university ranking system to.pptx
 
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
 
Imagine - HR; are handling the 'bad banter' - Stella Chandler.pdf
Imagine - HR; are handling the 'bad banter' - Stella Chandler.pdfImagine - HR; are handling the 'bad banter' - Stella Chandler.pdf
Imagine - HR; are handling the 'bad banter' - Stella Chandler.pdf
 
Day 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampDay 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC Bootcamp
 
Continuous Improvement Infographics for Learning
Continuous Improvement Infographics for LearningContinuous Improvement Infographics for Learning
Continuous Improvement Infographics for Learning
 
GENUINE Babe,Call Girls IN Baderpur Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Baderpur  Delhi | +91-8377087607GENUINE Babe,Call Girls IN Baderpur  Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Baderpur Delhi | +91-8377087607
 
Discover -CQ Master Class - Rikita Wadhwa.pdf
Discover -CQ Master Class - Rikita Wadhwa.pdfDiscover -CQ Master Class - Rikita Wadhwa.pdf
Discover -CQ Master Class - Rikita Wadhwa.pdf
 
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
 
internal analysis on strategic management
internal analysis on strategic managementinternal analysis on strategic management
internal analysis on strategic management
 
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote SpeakerLeadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
 
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICECall Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICE
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
 
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
 
Peak Performance & Resilience - Dr Dorian Dugmore
Peak Performance & Resilience - Dr Dorian DugmorePeak Performance & Resilience - Dr Dorian Dugmore
Peak Performance & Resilience - Dr Dorian Dugmore
 
Disrupt or be Disrupted - Kirk Vallis.pdf
Disrupt or be Disrupted - Kirk Vallis.pdfDisrupt or be Disrupted - Kirk Vallis.pdf
Disrupt or be Disrupted - Kirk Vallis.pdf
 
situational leadership theory by Misba Fathima S
situational leadership theory by Misba Fathima Ssituational leadership theory by Misba Fathima S
situational leadership theory by Misba Fathima S
 
LoveLocalGov - Chris Twigg, Inner Circle
LoveLocalGov - Chris Twigg, Inner CircleLoveLocalGov - Chris Twigg, Inner Circle
LoveLocalGov - Chris Twigg, Inner Circle
 
Call Now Pooja Mehta : 7738631006 Door Step Call Girls Rate 100% Satisfactio...
Call Now Pooja Mehta :  7738631006 Door Step Call Girls Rate 100% Satisfactio...Call Now Pooja Mehta :  7738631006 Door Step Call Girls Rate 100% Satisfactio...
Call Now Pooja Mehta : 7738631006 Door Step Call Girls Rate 100% Satisfactio...
 
Becoming an Inclusive Leader - Bernadette Thompson
Becoming an Inclusive Leader - Bernadette ThompsonBecoming an Inclusive Leader - Bernadette Thompson
Becoming an Inclusive Leader - Bernadette Thompson
 
Intro_University_Ranking_Introduction.pptx
Intro_University_Ranking_Introduction.pptxIntro_University_Ranking_Introduction.pptx
Intro_University_Ranking_Introduction.pptx
 

The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM May 2023.pdf

  • 1. The Biggest Cyber and Physical Security Threats to Critical Infrastructure Introduction: Critical infrastructure refers to the systems, facilities, and networks that are essential to the functioning of a society and its economy. These are the assets that, if damaged or disrupted, could have a significant impact on public health and safety, economic security, and national security. Examples of critical infrastructure include: 1. Energy systems (power plants, oil and gas refineries, pipelines) 2. Transportation systems (highways, bridges, airports, railways, ports) 3. Communication systems (telecommunications, internet, data centers) 4. Water and wastewater systems (dams, reservoirs, treatment plants) 5. Financial systems (banks, stock exchanges, payment systems) 6. Emergency services (police, fire, and ambulance services) 7. Healthcare systems (hospitals, clinics, medical supply chains)
  • 2. Of the many cyber and physical security threats to critical infrastructure here are some key ones: 1. Malware and ransomware attacks: Malicious software can infiltrate a system and cause damage or disruption to operations, and ransomware can encrypt files and demand payment in exchange for the decryption key. There have been several high-profile ransomware attacks on critical infrastructure in recent years, including attacks on energy and water utilities, transportation systems, and healthcare providers. Some recent statistics on ransomware attacks on critical infrastructure:  In 2020, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) reported a significant increase in ransomware attacks on industrial control systems (ICS) and critical infrastructure. These attacks involved a range of sectors, including manufacturing, energy, and transportation.  According to a report by cybersecurity firm Dragos, there were at least five ransomware attacks on operational technology (OT) networks in 2020, including attacks on energy and manufacturing companies. Dragos also said in February 2023 that ICS/OT ransomware attacks are up 87%.  The 2021 Data Breach Investigations Report by Verizon found that ransomware was involved in 10% of all data breaches in the public sector, which includes critical infrastructure organizations.  In May 2021, the Colonial Pipeline, which supplies fuel to much of the eastern United States, was hit by a ransomware attack that caused a temporary shutdown of its operations. This incident highlighted the vulnerability of critical infrastructure to cyber attacks.  According to a report by cybersecurity company CrowdStrike, the number of ransomware attacks on critical infrastructure increased by 158% in the first half of 2021 compared to the same period in 2020.  According to the 2023 CrowdStrike Global Threat Report, eCrime actors moving beyond ransom payments for monetization – 2022 saw a 20% increase in the number of adversaries conducting data theft and extortion campaigns. China-nexus espionage surged across all 39 global industry sectors and 20 geographic regions tracked by CrowdStrike Intelligence – Rise in China-nexus adversary activity shows that organizations across the world and in every vertical must be vigilant against the threat from Beijing.
  • 3. 2. Insider threats: Malicious insiders can use their access to cause damage or steal sensitive information. Here are some famous examples of cybersecurity insider threats that have succeeded in causing damage:  Edward Snowden: In 2013, Snowden, a former contractor for the U.S. National Security Agency (NSA), leaked classified documents to the media that revealed the extent of the agency's surveillance activities. The leak caused widespread controversy and prompted changes in how the U.S. government conducts surveillance.  Harold Martin: In 2016, Martin, a former contractor for the NSA, was arrested for stealing classified information from the agency. He was found to have taken terabytes of data over a period of two decades, including highly sensitive information about U.S. intelligence capabilities.  Chelsea Manning: In 2010, Manning, a former U.S. Army soldier, leaked classified documents to Wikileaks that included diplomatic cables, military reports, and other sensitive information. Manning was convicted of espionage and other charges and sentenced to 35 years in prison, although her sentence was later commuted by President Barack Obama.  Harold T. Martin III: In 2020, Martin, a former contractor for the National Security Agency (NSA), was sentenced to nine years in prison for stealing classified information from the agency. The stolen data included hacking tools and other sensitive information that Martin had stored on his personal devices. 3. Physical attacks: Physical attacks on critical infrastructure, such as sabotage or destruction of equipment, can also pose significant cybersecurity risks. Examples include:  Sabotage: This involves intentionally damaging or destroying critical infrastructure assets, such as by planting explosives near a key bridge or dam.  Theft: This involves stealing critical infrastructure assets or materials, such as copper wiring from a power substation or fuel from an oil refinery.  Vandalism: This involves damaging or defacing critical infrastructure assets, such as by graffiti or destruction of communication lines. Physical attacks on critical infrastructure can have serious consequences, including loss of life, environmental damage, and economic disruption. It's important for organizations responsible for critical infrastructure to have physical security measures in place to prevent and respond to physical attacks. These measures may include surveillance cameras, physical barriers, access controls, and emergency response plans.
  • 4. 4. Social engineering: This involves manipulating people into divulging sensitive information or taking actions that compromise security. Phishing is a primary example of such manipulation and is still one of the most prevalent types of attack. According to the 2021 Data Breach Investigations Report by Verizon, phishing was involved in 36% of all data breaches, making it the top threat action in the report. Phishing attacks are also becoming increasingly sophisticated and targeted, with attackers using social engineering tactics to trick victims into divulging sensitive information or downloading malware. This can include impersonating trusted individuals or organizations, creating convincing fake websites or emails, and using urgent or threatening language to pressure victims into taking action. According to the 2021 State of the Phish Report by Proofpoint, 75% of organizations surveyed reported being targeted by phishing attacks in 2020, and 59% of those attacks were successful in compromising at least one user account or system. The report also found that COVID-19 related phishing attacks were particularly prevalent in 2020, taking advantage of the pandemic to trick victims into providing personal information or downloading malware. 5. Distributed denial of service (DDoS) attacks: These attacks flood a system with traffic, overwhelming it and causing it to crash or become unavailable. 6. Advanced persistent threats (APTs): APTs are sophisticated, long-term attacks that target specific organizations and can involve multiple stages of infiltration and exfiltration. According to the 2023 CrowdStrike Global Threat Report, An uptick in social engineering tactics targeting human interactions – Tactics such as vishing direct victims to download malware and SIM swapping to circumvent multi-factor authentication (MFA). Epilogue: If you have thoughts and ideas on how to improve security for critical infrastructure I would love to hear them. In the meantime, here is a presentation on why power plants are particularly vulnerable to cyber threats. https://www.youtube.com/watch?v=rCG-WaLGFQw