INDEX
1.   Asymmetric Warfare e.g. Unrestricted Warfare
2.   Definition of Critical Infrastructure
3.   A Network of Inter...
1. Asymmetric Warfare e.g. Unrestricted Warfare
                                             Technology
                  ...
2. Definition of Critical Infrastructure
A system that is so vital for the equilibrium of an organization that its destruc...
3. A network of Interconnected Macro Systems
Each system is composed of different layers:
•Physical
•Digital-cyber
•Operat...
4. Implications & Complications


Fading borders                                            Complexity     Interconnection...
5. Threat Exposition
Speeding up of internal processes + Growing demand for interactivity
= Great number of access points ...
6. Threat Scenario – Cyber Attacks
Cyber attacks are the main threat against critical systems due to their increased depen...
7. Threat Scenario – Cyber Attackers
It is vital to identify the motives behind cyber attackers




                      ...
8. Threat Scenario - Context
Common attacks exploit systems’ vulnerabilities at the interconnection and interdependence
la...
9. Defense Strategies – Risk Management

Risk Management applied to the protection of Critical Infrastructures is affected...
10. Defense Strategies – Resistance and Resilience

Resistance is futile when dealing with highly unpredictable risks




...
11. Resilience, Redundancy and Attack Resistance
Redundancy is a typical resilience strategy for highly unpredictable syst...
12. An Efficient Solution

 “Structural sink” at the hub level
                                                    Shared ...
Questions?                                       ¿Preguntas?
            English/French                                   ...
Ghioni Fabio The Importance of System Availability in Corporate Critical Infrastructure Protection
Upcoming SlideShare
Loading in …5
×

Ghioni Fabio The Importance of System Availability in Corporate Critical Infrastructure Protection

1,349 views

Published on

The Importance of System Availability in Corporate Critical Infrastructure Protection

Published in: Technology, Business
  • Be the first to comment

Ghioni Fabio The Importance of System Availability in Corporate Critical Infrastructure Protection

  1. 1. INDEX 1. Asymmetric Warfare e.g. Unrestricted Warfare 2. Definition of Critical Infrastructure 3. A Network of Interconnected Macro Systems 4. Implications & Complications 5. Threat Exposition 6. Threat Scenario – Cyber Attacks 7. Threat Scenario – Cyber Attackers 8. Threat Scenario – Context 9. Defense Strategies – Risk Management 10. Defense Strategies – Resistance and Resilience 11. Resilience, Redundancy and Attack Resistance 12. An Efficient Solution
  2. 2. 1. Asymmetric Warfare e.g. Unrestricted Warfare Technology Low High Strong Dirty War Systemic War Power Mechanic War Peace War ICT War Weak We are rapidly moving towards the ICT War… High technological skills versus weak power… In other words the epitome of THE ASYMMETRIC WAR
  3. 3. 2. Definition of Critical Infrastructure A system that is so vital for the equilibrium of an organization that its destruction or incapacitation could have a debilitating impact energy critical communications hubs air traffic emergency utilities military intrusion public transport banks and financial telecommunication systems s During the last decades, critical infrastructures have increased their dependence on ICT
  4. 4. 3. A network of Interconnected Macro Systems Each system is composed of different layers: •Physical •Digital-cyber •Operative CI 2 •Strategic-organizational CI 1 CI 4 CI 3 Interconnection and Interdependency are essential features of macro systems
  5. 5. 4. Implications & Complications Fading borders Complexity Interconnection Cascade effects Unpredictability Different layers Different modelization
  6. 6. 5. Threat Exposition Speeding up of internal processes + Growing demand for interactivity = Great number of access points and doors to critical infrastructures A long term approach is needed when dealing with Critical Infrastructure Protection
  7. 7. 6. Threat Scenario – Cyber Attacks Cyber attacks are the main threat against critical systems due to their increased dependence upon information technology
  8. 8. 7. Threat Scenario – Cyber Attackers It is vital to identify the motives behind cyber attackers Monetary gain is the key motivator
  9. 9. 8. Threat Scenario - Context Common attacks exploit systems’ vulnerabilities at the interconnection and interdependence layer
  10. 10. 9. Defense Strategies – Risk Management Risk Management applied to the protection of Critical Infrastructures is affected by a high degree of uncertainty deriving from: complexity low predictability incessant technological change
  11. 11. 10. Defense Strategies – Resistance and Resilience Resistance is futile when dealing with highly unpredictable risks Resilience, or the ability to recover from unexpected events, can be the appropriate strategy
  12. 12. 11. Resilience, Redundancy and Attack Resistance Redundancy is a typical resilience strategy for highly unpredictable systems Redundancy = Less Efficiency and Greater Complexity
  13. 13. 12. An Efficient Solution “Structural sink” at the hub level Shared backup facilities Higher Dinamicity Separation between Cyber and Strategic layers Lower Costs
  14. 14. Questions? ¿Preguntas? English/French Spanish Ερωτήσεις? вопросы? Greek Russian Domande? Perguntas? Italian Fragen? Portuguese German َ ‫أ‬ ََِ Fabio Ghioni Sindarin Arabic fabio.ghioni@telecomitalia.it tupoQghachmey Japanese Klingon

×