Cybersecurity and Infrastructure Protection
By M. Scott Burns and Jane LeClair
()
About this ebook
Related to Cybersecurity and Infrastructure Protection
Related ebooks
Cyberwar, Cyberterror, Cybercrime & Cyberactivism: An in-depth guide to the role of standards in the cybersecurity environment Rating: 4 out of 5 stars4/5Securing Critical Infrastructures Rating: 0 out of 5 stars0 ratingsCybersecurity: Issues of Today, a Path for Tomorrow Rating: 0 out of 5 stars0 ratingsThe Cybersecurity Maturity Model Certification (CMMC) – A pocket guide Rating: 0 out of 5 stars0 ratingsNIST Cybersecurity Framework: A pocket guide Rating: 5 out of 5 stars5/5Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges Rating: 0 out of 5 stars0 ratingsLessons Learned: Critical Information Infrastructure Protection: How to protect critical information infrastructure Rating: 0 out of 5 stars0 ratingsSafeguarding the Digital Fortress: A Guide to Cyber Security: The IT Collection Rating: 0 out of 5 stars0 ratingsThe Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks Rating: 0 out of 5 stars0 ratingsBusiness Practical Security Rating: 0 out of 5 stars0 ratingsNIST Cloud Security: Cyber Threats, Policies, And Best Practices Rating: 0 out of 5 stars0 ratingsManaging Cybersecurity Risk: How Directors and Corporate Officers Can Protect their Businesses Rating: 5 out of 5 stars5/5Cyber Security From Beginner To Expert Cyber Security Made Easy For Absolute Beginners Rating: 0 out of 5 stars0 ratingsCyber Security Consultants Playbook Rating: 0 out of 5 stars0 ratingsShields Up: Cybersecurity Project Management Rating: 0 out of 5 stars0 ratingsCyber Essentials: A guide to the Cyber Essentials and Cyber Essentials Plus certifications Rating: 0 out of 5 stars0 ratingsThe Cybersecurity Mindset: A Virtual and Transformational Thinking Mode Rating: 0 out of 5 stars0 ratingsDigital Earth: Cyber threats, privacy and ethics in an age of paranoia Rating: 0 out of 5 stars0 ratingsCYBER SECURITY HANDBOOK Part-2: Lock, Stock, and Cyber: A Comprehensive Security Handbook Rating: 0 out of 5 stars0 ratingsLeveraging Agile Project Management for Robust Cybersecurity: A Guide for Leaders & Managers Rating: 0 out of 5 stars0 ratingsProtecting Our Future, Volume 2: Educating a Cybersecurity Workforce Rating: 0 out of 5 stars0 ratingsCybersecurity First Principles: A Reboot of Strategy and Tactics Rating: 5 out of 5 stars5/5Cyber Security Risk Management Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsBuild a Security Culture Rating: 0 out of 5 stars0 ratingsManaging Cybersecurity Risk: Book 3 Rating: 0 out of 5 stars0 ratingsSecurity controls Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsSelling Information Security to the Board: A Primer Rating: 0 out of 5 stars0 ratingsThe Coming Cyber War: What Executives, the Board, and You Should Know Rating: 0 out of 5 stars0 ratingsThe Art of Cyber Security: A practical guide to winning the war on cyber crime Rating: 0 out of 5 stars0 ratings
Computers For You
Deep Search: How to Explore the Internet More Effectively Rating: 5 out of 5 stars5/5Mastering ChatGPT: 21 Prompts Templates for Effortless Writing Rating: 4 out of 5 stars4/5Creating Online Courses with ChatGPT | A Step-by-Step Guide with Prompt Templates Rating: 4 out of 5 stars4/5Procreate for Beginners: Introduction to Procreate for Drawing and Illustrating on the iPad Rating: 5 out of 5 stars5/5Elon Musk Rating: 4 out of 5 stars4/5The Self-Taught Computer Scientist: The Beginner's Guide to Data Structures & Algorithms Rating: 0 out of 5 stars0 ratingsThe ChatGPT Millionaire Handbook: Make Money Online With the Power of AI Technology Rating: 4 out of 5 stars4/5The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution Rating: 4 out of 5 stars4/5How to Create Cpn Numbers the Right way: A Step by Step Guide to Creating cpn Numbers Legally Rating: 4 out of 5 stars4/5CompTIA Security+ Get Certified Get Ahead: SY0-701 Study Guide Rating: 5 out of 5 stars5/5SQL QuickStart Guide: The Simplified Beginner's Guide to Managing, Analyzing, and Manipulating Data With SQL Rating: 4 out of 5 stars4/5Standard Deviations: Flawed Assumptions, Tortured Data, and Other Ways to Lie with Statistics Rating: 4 out of 5 stars4/5Microsoft Azure For Dummies Rating: 0 out of 5 stars0 ratingsEverybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5CompTIA IT Fundamentals (ITF+) Study Guide: Exam FC0-U61 Rating: 0 out of 5 stars0 ratingsLearn Typing Rating: 0 out of 5 stars0 ratingsStorytelling with Data: Let's Practice! Rating: 4 out of 5 stars4/5What Video Games Have to Teach Us About Learning and Literacy. Second Edition Rating: 4 out of 5 stars4/5Fundamentals of Programming: Using Python Rating: 5 out of 5 stars5/5A Quickstart Guide To Becoming A ChatGPT Millionaire: The ChatGPT Book For Beginners (Lazy Money Series®) Rating: 4 out of 5 stars4/5The Musician's Ai Handbook: Enhance And Promote Your Music With Artificial Intelligence Rating: 5 out of 5 stars5/5Alan Turing: The Enigma: The Book That Inspired the Film The Imitation Game - Updated Edition Rating: 4 out of 5 stars4/5Computer Science I Essentials Rating: 5 out of 5 stars5/5The Professional Voiceover Handbook: Voiceover training, #1 Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5
Reviews for Cybersecurity and Infrastructure Protection
0 ratings0 reviews
Book preview
Cybersecurity and Infrastructure Protection - M. Scott Burns
Chapter 1
Introduction
The security of the data in our digital systems has dominated conversations throughout the cyber community in recent years. This conversation is prompted by the ongoing and escalating series of digital breaches that have affected business organizations, learning institutions, healthcare facilities, and government agencies. Hardly a week goes by that the media does not report on yet another cyber breach costing millions of dollars, which exposes personally identifying information (PII), and sullies the reputation of yet another organization or agency. Last year, according to some reports, there were over 40 million cyber-attacks, averaging over 100,000 per day—an increase of nearly 50 percent from the previous year (Bennett, 2014). The level of attacks in 2015 seem to be outpacing even that. In one attack alone on a government agency in the United States in early 2015, over 22 million records were stolen and tens of millions of records were lost during hacks of several healthcare services (Granville, 2015). The financial costs of these digital breaches are staggering. According to well-known U.K. insurer Lloyd’s, cyber-attacks are costing organizations over 400 billion dollars each year, and those costs are rising. These high-profile cyber breaches highlighted in the media gain a good deal of public attention, especially if—as with the SONY breach in 2014—there are celebrities involved (Gandel, 2015).
While the reports of such attacks are meaningful, as they tend to educate and alert the general public to the ongoing threats to our security, they often neglect a more important aspect—the cyber threats and attacks to our critical infrastructure, the foundations of which keep our society functioning. While we are inconvenienced when our credit card services are disrupted, or troubled at the prospect of our health records being made public, we fail to recognize the devastating impact to our society should a cyber-attack suddenly cut off our water supply, electricity, or other services we count on in our daily lives. Although they receive less media attention, attacks on our critical infrastructure are a serious concern. According to a recent survey, almost 90 percent of managers in critical sectors report attacks on their organizations, and nearly 50 percent believe it is likely that a cyber-attack on critical infrastructure within the next five years will result in the loss of lives. Our critical infrastructure is being attacked by those with malicious intent and is, by some accounts, more vulnerable than many believe. It must be protected.
In this book we will examine the 16 critical infrastructure sectors and how each has its own importance yet is strategically intertwined with others. We will also examine what the threats to these sectors are, who might be attacking them, how those attacks might take place, the measures that are being taken to protect them, and the governance that seeks to regulate that protection.
A Brief Review of Critical Infrastructure Protection
The nation’s critical infrastructure provides the essential services that underpin American society and serves as the backbone of our nation’s economy, security, and health. We know it as the power we use in our homes, the water we drink, the transportation that moves us, the stores we shop in, and the communication systems we rely on to stay in touch with friends and family.
—United States Department of
Homeland Security
As identified by the United States government through Presidential Policy Directive 21 (PPD-21): Critical Infrastructure Security and Resilience,
there are 16 Critical Infrastructures. Listed alphabetically, they are: (1) the Chemical Sector, (2) the Commercial Facilities Sector, (3) the Communications Sector, (4) the Critical Manufacturing Sector, (5) the Dams Sector, (6) the Defense Industrial Base Sector, (7) the Emergency Services Sector, (8) the Energy Sector, (9) the Financial Services Sector, (10) the Food and Agriculture Sector, (11) the Government Facilities Sector, (12) the Healthcare and Public Health Sector, (13) the Information Technology Sector, (14) the Nuclear Reactors, Materials, and Waste Sector, (15) the Transportation Systems Sector, and (16) the Water and Wastewater Systems Sector (U.S. Department of