SlideShare a Scribd company logo
1 of 4
Download to read offline
The Biggest Cyber and Physical Security
Threats to Critical Infrastructure
Introduction: Critical infrastructure refers to the systems, facilities, and networks that are
essential to the functioning of a society and its economy. These are the assets that, if damaged or
disrupted, could have a significant impact on public health and safety, economic security, and
national security.
Examples of critical infrastructure include:
1. Energy systems (power plants, oil and gas refineries, pipelines)
2. Transportation systems (highways, bridges, airports, railways, ports)
3. Communication systems (telecommunications, internet, data centers)
4. Water and wastewater systems (dams, reservoirs, treatment plants)
5. Financial systems (banks, stock exchanges, payment systems)
6. Emergency services (police, fire, and ambulance services)
7. Healthcare systems (hospitals, clinics, medical supply chains)
Of the many cyber and physical security threats to critical infrastructure here are some key ones:
1. Malware and ransomware attacks: Malicious software can infiltrate a system and cause
damage or disruption to operations, and ransomware can encrypt files and demand payment in
exchange for the decryption key.
There have been several high-profile ransomware attacks on critical infrastructure in recent
years, including attacks on energy and water utilities, transportation systems, and healthcare
providers. Some recent statistics on ransomware attacks on critical infrastructure:
 In 2020, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) reported a
significant increase in ransomware attacks on industrial control systems (ICS) and critical
infrastructure. These attacks involved a range of sectors, including manufacturing,
energy, and transportation.
 According to a report by cybersecurity firm Dragos, there were at least five ransomware
attacks on operational technology (OT) networks in 2020, including attacks on energy
and manufacturing companies. Dragos also said in February 2023 that ICS/OT
ransomware attacks are up 87%.
 The 2021 Data Breach Investigations Report by Verizon found that ransomware was
involved in 10% of all data breaches in the public sector, which includes critical
infrastructure organizations.
 In May 2021, the Colonial Pipeline, which supplies fuel to much of the eastern United
States, was hit by a ransomware attack that caused a temporary shutdown of its
operations. This incident highlighted the vulnerability of critical infrastructure to cyber
attacks.
 According to a report by cybersecurity company CrowdStrike, the number of ransomware
attacks on critical infrastructure increased by 158% in the first half of 2021 compared to
the same period in 2020.
 According to the 2023 CrowdStrike Global Threat Report, eCrime actors moving beyond
ransom payments for monetization – 2022 saw a 20% increase in the number of
adversaries conducting data theft and extortion campaigns. China-nexus espionage surged
across all 39 global industry sectors and 20 geographic regions tracked by CrowdStrike
Intelligence – Rise in China-nexus adversary activity shows that organizations across the
world and in every vertical must be vigilant against the threat from Beijing.
2. Insider threats: Malicious insiders can use their access to cause damage or steal sensitive
information. Here are some famous examples of cybersecurity insider threats that have
succeeded in causing damage:
 Edward Snowden: In 2013, Snowden, a former contractor for the U.S. National Security
Agency (NSA), leaked classified documents to the media that revealed the extent of the
agency's surveillance activities. The leak caused widespread controversy and prompted
changes in how the U.S. government conducts surveillance.
 Harold Martin: In 2016, Martin, a former contractor for the NSA, was arrested for
stealing classified information from the agency. He was found to have taken terabytes of
data over a period of two decades, including highly sensitive information about U.S.
intelligence capabilities.
 Chelsea Manning: In 2010, Manning, a former U.S. Army soldier, leaked classified
documents to Wikileaks that included diplomatic cables, military reports, and other
sensitive information. Manning was convicted of espionage and other charges and
sentenced to 35 years in prison, although her sentence was later commuted by President
Barack Obama.
 Harold T. Martin III: In 2020, Martin, a former contractor for the National Security
Agency (NSA), was sentenced to nine years in prison for stealing classified information
from the agency. The stolen data included hacking tools and other sensitive information
that Martin had stored on his personal devices.
3. Physical attacks: Physical attacks on critical infrastructure, such as sabotage or destruction
of equipment, can also pose significant cybersecurity risks. Examples include:
 Sabotage: This involves intentionally damaging or destroying critical infrastructure
assets, such as by planting explosives near a key bridge or dam.
 Theft: This involves stealing critical infrastructure assets or materials, such as copper
wiring from a power substation or fuel from an oil refinery.
 Vandalism: This involves damaging or defacing critical infrastructure assets, such as by
graffiti or destruction of communication lines.
Physical attacks on critical infrastructure can have serious consequences, including loss of life,
environmental damage, and economic disruption. It's important for organizations responsible for
critical infrastructure to have physical security measures in place to prevent and respond to
physical attacks. These measures may include surveillance cameras, physical barriers, access
controls, and emergency response plans.
4. Social engineering: This involves manipulating people into divulging sensitive information
or taking actions that compromise security. Phishing is a primary example of such manipulation
and is still one of the most prevalent types of attack. According to the 2021 Data Breach
Investigations Report by Verizon, phishing was involved in 36% of all data breaches, making it
the top threat action in the report.
Phishing attacks are also becoming increasingly sophisticated and targeted, with attackers using
social engineering tactics to trick victims into divulging sensitive information or downloading
malware. This can include impersonating trusted individuals or organizations, creating
convincing fake websites or emails, and using urgent or threatening language to pressure victims
into taking action.
According to the 2021 State of the Phish Report by Proofpoint, 75% of organizations surveyed
reported being targeted by phishing attacks in 2020, and 59% of those attacks were successful in
compromising at least one user account or system. The report also found that COVID-19 related
phishing attacks were particularly prevalent in 2020, taking advantage of the pandemic to trick
victims into providing personal information or downloading malware.
5. Distributed denial of service (DDoS) attacks: These attacks flood a system with traffic,
overwhelming it and causing it to crash or become unavailable.
6. Advanced persistent threats (APTs): APTs are sophisticated, long-term attacks that target
specific organizations and can involve multiple stages of infiltration and exfiltration.
According to the 2023 CrowdStrike Global Threat Report, An uptick in social engineering tactics
targeting human interactions – Tactics such as vishing direct victims to download malware and
SIM swapping to circumvent multi-factor authentication (MFA).
Epilogue: If you have thoughts and ideas on how to improve security for critical infrastructure I
would love to hear them. In the meantime, here is a presentation on why power plants are
particularly vulnerable to cyber threats. https://www.youtube.com/watch?v=rCG-WaLGFQw

More Related Content

Similar to The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM May 2023.pdf

Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookMargarete McGrath
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsDavid Sweigert
 
Cyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsCyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsKory Edwards
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docxalinainglis
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityAndrea Rossetti
 
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYTHE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYijcsit
 
Cyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsCyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsKory Edwards
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecuritySpark Security
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionWilliam McBorrough
 
Protect the Unexpected
Protect the UnexpectedProtect the Unexpected
Protect the UnexpectedCharles Mok
 
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryWhat Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryCR Group
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxericbrooks84875
 
Digital danger zone tackling cyber security
Digital danger zone tackling cyber securityDigital danger zone tackling cyber security
Digital danger zone tackling cyber securityJohn Kingsley
 
Digital danger zone tackling cyber security
Digital danger zone tackling cyber securityDigital danger zone tackling cyber security
Digital danger zone tackling cyber securityiFluidsEng
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docxrtodd599
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemLillian Ekwosi-Egbulem
 

Similar to The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM May 2023.pdf (20)

C018131821
C018131821C018131821
C018131821
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standards
 
Cyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsCyber Threat to Public Safety Communications
Cyber Threat to Public Safety Communications
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYTHE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
 
The Professionalization of the Hacker Industry
The Professionalization of the Hacker IndustryThe Professionalization of the Hacker Industry
The Professionalization of the Hacker Industry
 
Cyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsCyber Threat to Public Safety Communications
Cyber Threat to Public Safety Communications
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for Cybersecurity
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
Protect the Unexpected
Protect the UnexpectedProtect the Unexpected
Protect the Unexpected
 
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryWhat Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 
Digital danger zone tackling cyber security
Digital danger zone tackling cyber securityDigital danger zone tackling cyber security
Digital danger zone tackling cyber security
 
Digital danger zone tackling cyber security
Digital danger zone tackling cyber securityDigital danger zone tackling cyber security
Digital danger zone tackling cyber security
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docx
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
 

More from Fas (Feisal) Mosleh

Robotics for Power Plants with IBM and Certrec Webinar Presentation V6.pdf
Robotics for Power Plants with IBM and Certrec Webinar Presentation V6.pdfRobotics for Power Plants with IBM and Certrec Webinar Presentation V6.pdf
Robotics for Power Plants with IBM and Certrec Webinar Presentation V6.pdfFas (Feisal) Mosleh
 
WHITE PAPER - The Importance of CIP in the Energy Sector v2.0.pdf
WHITE PAPER - The Importance of CIP in the Energy Sector v2.0.pdfWHITE PAPER - The Importance of CIP in the Energy Sector v2.0.pdf
WHITE PAPER - The Importance of CIP in the Energy Sector v2.0.pdfFas (Feisal) Mosleh
 
Brief introduction to NoSQL by fas mosleh
Brief introduction to NoSQL by fas moslehBrief introduction to NoSQL by fas mosleh
Brief introduction to NoSQL by fas moslehFas (Feisal) Mosleh
 
Introduction to virtual desktop infrastructure v3
Introduction to virtual desktop infrastructure  v3Introduction to virtual desktop infrastructure  v3
Introduction to virtual desktop infrastructure v3Fas (Feisal) Mosleh
 
Joint gtm for software and systems technologies
Joint gtm for software and systems technologiesJoint gtm for software and systems technologies
Joint gtm for software and systems technologiesFas (Feisal) Mosleh
 
Hq camera avago ee times article v2
Hq camera    avago ee times article v2Hq camera    avago ee times article v2
Hq camera avago ee times article v2Fas (Feisal) Mosleh
 
Agilent technologies announces innovative image pipe for camera phones
Agilent technologies announces innovative image pipe for camera phonesAgilent technologies announces innovative image pipe for camera phones
Agilent technologies announces innovative image pipe for camera phonesFas (Feisal) Mosleh
 
Mission critical linux white paper
Mission critical linux white paperMission critical linux white paper
Mission critical linux white paperFas (Feisal) Mosleh
 
Juldee IP and tech monetization v4 by ex-Hewlett-Packard Director of IP Fas M...
Juldee IP and tech monetization v4 by ex-Hewlett-Packard Director of IP Fas M...Juldee IP and tech monetization v4 by ex-Hewlett-Packard Director of IP Fas M...
Juldee IP and tech monetization v4 by ex-Hewlett-Packard Director of IP Fas M...Fas (Feisal) Mosleh
 
Syndicated Patent Deals = Supercharging the buying and selling of patents by ...
Syndicated Patent Deals = Supercharging the buying and selling of patents by ...Syndicated Patent Deals = Supercharging the buying and selling of patents by ...
Syndicated Patent Deals = Supercharging the buying and selling of patents by ...Fas (Feisal) Mosleh
 
Juldee Ventures - why si valley summary
Juldee Ventures  - why si valley summaryJuldee Ventures  - why si valley summary
Juldee Ventures - why si valley summaryFas (Feisal) Mosleh
 
Introduction to IP and technology licensing for technology executives by Fas ...
Introduction to IP and technology licensing for technology executives by Fas ...Introduction to IP and technology licensing for technology executives by Fas ...
Introduction to IP and technology licensing for technology executives by Fas ...Fas (Feisal) Mosleh
 
The value of patents the executives' perspective v3
The value of patents   the executives' perspective v3The value of patents   the executives' perspective v3
The value of patents the executives' perspective v3Fas (Feisal) Mosleh
 
Innovation & disruption hp talk april 2010 juldee version
Innovation & disruption hp talk april 2010 juldee versionInnovation & disruption hp talk april 2010 juldee version
Innovation & disruption hp talk april 2010 juldee versionFas (Feisal) Mosleh
 
Creative venturing creative funding v2 12 06-2013 for distribution
Creative venturing creative funding v2 12 06-2013 for distributionCreative venturing creative funding v2 12 06-2013 for distribution
Creative venturing creative funding v2 12 06-2013 for distributionFas (Feisal) Mosleh
 
Creative exits v3 10 20-2013 for distribution Fas Mosleh at OPEN Networking E...
Creative exits v3 10 20-2013 for distribution Fas Mosleh at OPEN Networking E...Creative exits v3 10 20-2013 for distribution Fas Mosleh at OPEN Networking E...
Creative exits v3 10 20-2013 for distribution Fas Mosleh at OPEN Networking E...Fas (Feisal) Mosleh
 
Why Acquire Patents? kanzatec summary 2013
Why Acquire Patents?   kanzatec summary 2013Why Acquire Patents?   kanzatec summary 2013
Why Acquire Patents? kanzatec summary 2013Fas (Feisal) Mosleh
 

More from Fas (Feisal) Mosleh (19)

Robotics for Power Plants with IBM and Certrec Webinar Presentation V6.pdf
Robotics for Power Plants with IBM and Certrec Webinar Presentation V6.pdfRobotics for Power Plants with IBM and Certrec Webinar Presentation V6.pdf
Robotics for Power Plants with IBM and Certrec Webinar Presentation V6.pdf
 
WHITE PAPER - The Importance of CIP in the Energy Sector v2.0.pdf
WHITE PAPER - The Importance of CIP in the Energy Sector v2.0.pdfWHITE PAPER - The Importance of CIP in the Energy Sector v2.0.pdf
WHITE PAPER - The Importance of CIP in the Energy Sector v2.0.pdf
 
Brief introduction to NoSQL by fas mosleh
Brief introduction to NoSQL by fas moslehBrief introduction to NoSQL by fas mosleh
Brief introduction to NoSQL by fas mosleh
 
Introduction to virtual desktop infrastructure v3
Introduction to virtual desktop infrastructure  v3Introduction to virtual desktop infrastructure  v3
Introduction to virtual desktop infrastructure v3
 
Joint gtm for software and systems technologies
Joint gtm for software and systems technologiesJoint gtm for software and systems technologies
Joint gtm for software and systems technologies
 
Hq camera avago ee times article v2
Hq camera    avago ee times article v2Hq camera    avago ee times article v2
Hq camera avago ee times article v2
 
Agilent technologies announces innovative image pipe for camera phones
Agilent technologies announces innovative image pipe for camera phonesAgilent technologies announces innovative image pipe for camera phones
Agilent technologies announces innovative image pipe for camera phones
 
Migrating from ibm to hpe
Migrating from ibm to hpeMigrating from ibm to hpe
Migrating from ibm to hpe
 
Mission critical linux white paper
Mission critical linux white paperMission critical linux white paper
Mission critical linux white paper
 
Juldee IP and tech monetization v4 by ex-Hewlett-Packard Director of IP Fas M...
Juldee IP and tech monetization v4 by ex-Hewlett-Packard Director of IP Fas M...Juldee IP and tech monetization v4 by ex-Hewlett-Packard Director of IP Fas M...
Juldee IP and tech monetization v4 by ex-Hewlett-Packard Director of IP Fas M...
 
Syndicated Patent Deals = Supercharging the buying and selling of patents by ...
Syndicated Patent Deals = Supercharging the buying and selling of patents by ...Syndicated Patent Deals = Supercharging the buying and selling of patents by ...
Syndicated Patent Deals = Supercharging the buying and selling of patents by ...
 
Juldee Ventures - why si valley summary
Juldee Ventures  - why si valley summaryJuldee Ventures  - why si valley summary
Juldee Ventures - why si valley summary
 
Introduction to IP and technology licensing for technology executives by Fas ...
Introduction to IP and technology licensing for technology executives by Fas ...Introduction to IP and technology licensing for technology executives by Fas ...
Introduction to IP and technology licensing for technology executives by Fas ...
 
The value of patents the executives' perspective v3
The value of patents   the executives' perspective v3The value of patents   the executives' perspective v3
The value of patents the executives' perspective v3
 
Innovation & disruption hp talk april 2010 juldee version
Innovation & disruption hp talk april 2010 juldee versionInnovation & disruption hp talk april 2010 juldee version
Innovation & disruption hp talk april 2010 juldee version
 
Creative venturing creative funding v2 12 06-2013 for distribution
Creative venturing creative funding v2 12 06-2013 for distributionCreative venturing creative funding v2 12 06-2013 for distribution
Creative venturing creative funding v2 12 06-2013 for distribution
 
Creative exits v3 10 20-2013 for distribution Fas Mosleh at OPEN Networking E...
Creative exits v3 10 20-2013 for distribution Fas Mosleh at OPEN Networking E...Creative exits v3 10 20-2013 for distribution Fas Mosleh at OPEN Networking E...
Creative exits v3 10 20-2013 for distribution Fas Mosleh at OPEN Networking E...
 
Upping valuation v2 9 30-2013
Upping valuation v2 9 30-2013Upping valuation v2 9 30-2013
Upping valuation v2 9 30-2013
 
Why Acquire Patents? kanzatec summary 2013
Why Acquire Patents?   kanzatec summary 2013Why Acquire Patents?   kanzatec summary 2013
Why Acquire Patents? kanzatec summary 2013
 

Recently uploaded

{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, MumbaiPooja Nehwal
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girladitipandeya
 
Board Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch PresentationBoard Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch Presentationcraig524401
 
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceanilsa9823
 
LPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations ReviewLPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations Reviewthomas851723
 
Fifteenth Finance Commission Presentation
Fifteenth Finance Commission PresentationFifteenth Finance Commission Presentation
Fifteenth Finance Commission Presentationmintusiprd
 
Introduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-EngineeringIntroduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-Engineeringthomas851723
 
CEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyCEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyHafizMuhammadAbdulla5
 
LPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business SectorLPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business Sectorthomas851723
 
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Nehwal
 
LPC Facility Design And Re-engineering Presentation
LPC Facility Design And Re-engineering PresentationLPC Facility Design And Re-engineering Presentation
LPC Facility Design And Re-engineering Presentationthomas851723
 
Day 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampDay 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampPLCLeadershipDevelop
 
GENUINE Babe,Call Girls IN Badarpur Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Badarpur  Delhi | +91-8377087607GENUINE Babe,Call Girls IN Badarpur  Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Badarpur Delhi | +91-8377087607dollysharma2066
 
LPC User Requirements for Automated Storage System Presentation
LPC User Requirements for Automated Storage System PresentationLPC User Requirements for Automated Storage System Presentation
LPC User Requirements for Automated Storage System Presentationthomas851723
 
Training Methods and Training Objectives
Training Methods and Training ObjectivesTraining Methods and Training Objectives
Training Methods and Training Objectivesmintusiprd
 
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Roomdivyansh0kumar0
 

Recently uploaded (20)

{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
 
Board Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch PresentationBoard Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch Presentation
 
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
 
LPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations ReviewLPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations Review
 
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICECall Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICE
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
 
Fifteenth Finance Commission Presentation
Fifteenth Finance Commission PresentationFifteenth Finance Commission Presentation
Fifteenth Finance Commission Presentation
 
Introduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-EngineeringIntroduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-Engineering
 
CEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyCEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biography
 
LPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business SectorLPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business Sector
 
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
 
LPC Facility Design And Re-engineering Presentation
LPC Facility Design And Re-engineering PresentationLPC Facility Design And Re-engineering Presentation
LPC Facility Design And Re-engineering Presentation
 
Day 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampDay 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC Bootcamp
 
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Servicesauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
 
GENUINE Babe,Call Girls IN Badarpur Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Badarpur  Delhi | +91-8377087607GENUINE Babe,Call Girls IN Badarpur  Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Badarpur Delhi | +91-8377087607
 
Becoming an Inclusive Leader - Bernadette Thompson
Becoming an Inclusive Leader - Bernadette ThompsonBecoming an Inclusive Leader - Bernadette Thompson
Becoming an Inclusive Leader - Bernadette Thompson
 
LPC User Requirements for Automated Storage System Presentation
LPC User Requirements for Automated Storage System PresentationLPC User Requirements for Automated Storage System Presentation
LPC User Requirements for Automated Storage System Presentation
 
Training Methods and Training Objectives
Training Methods and Training ObjectivesTraining Methods and Training Objectives
Training Methods and Training Objectives
 
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
 

The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM May 2023.pdf

  • 1. The Biggest Cyber and Physical Security Threats to Critical Infrastructure Introduction: Critical infrastructure refers to the systems, facilities, and networks that are essential to the functioning of a society and its economy. These are the assets that, if damaged or disrupted, could have a significant impact on public health and safety, economic security, and national security. Examples of critical infrastructure include: 1. Energy systems (power plants, oil and gas refineries, pipelines) 2. Transportation systems (highways, bridges, airports, railways, ports) 3. Communication systems (telecommunications, internet, data centers) 4. Water and wastewater systems (dams, reservoirs, treatment plants) 5. Financial systems (banks, stock exchanges, payment systems) 6. Emergency services (police, fire, and ambulance services) 7. Healthcare systems (hospitals, clinics, medical supply chains)
  • 2. Of the many cyber and physical security threats to critical infrastructure here are some key ones: 1. Malware and ransomware attacks: Malicious software can infiltrate a system and cause damage or disruption to operations, and ransomware can encrypt files and demand payment in exchange for the decryption key. There have been several high-profile ransomware attacks on critical infrastructure in recent years, including attacks on energy and water utilities, transportation systems, and healthcare providers. Some recent statistics on ransomware attacks on critical infrastructure:  In 2020, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) reported a significant increase in ransomware attacks on industrial control systems (ICS) and critical infrastructure. These attacks involved a range of sectors, including manufacturing, energy, and transportation.  According to a report by cybersecurity firm Dragos, there were at least five ransomware attacks on operational technology (OT) networks in 2020, including attacks on energy and manufacturing companies. Dragos also said in February 2023 that ICS/OT ransomware attacks are up 87%.  The 2021 Data Breach Investigations Report by Verizon found that ransomware was involved in 10% of all data breaches in the public sector, which includes critical infrastructure organizations.  In May 2021, the Colonial Pipeline, which supplies fuel to much of the eastern United States, was hit by a ransomware attack that caused a temporary shutdown of its operations. This incident highlighted the vulnerability of critical infrastructure to cyber attacks.  According to a report by cybersecurity company CrowdStrike, the number of ransomware attacks on critical infrastructure increased by 158% in the first half of 2021 compared to the same period in 2020.  According to the 2023 CrowdStrike Global Threat Report, eCrime actors moving beyond ransom payments for monetization – 2022 saw a 20% increase in the number of adversaries conducting data theft and extortion campaigns. China-nexus espionage surged across all 39 global industry sectors and 20 geographic regions tracked by CrowdStrike Intelligence – Rise in China-nexus adversary activity shows that organizations across the world and in every vertical must be vigilant against the threat from Beijing.
  • 3. 2. Insider threats: Malicious insiders can use their access to cause damage or steal sensitive information. Here are some famous examples of cybersecurity insider threats that have succeeded in causing damage:  Edward Snowden: In 2013, Snowden, a former contractor for the U.S. National Security Agency (NSA), leaked classified documents to the media that revealed the extent of the agency's surveillance activities. The leak caused widespread controversy and prompted changes in how the U.S. government conducts surveillance.  Harold Martin: In 2016, Martin, a former contractor for the NSA, was arrested for stealing classified information from the agency. He was found to have taken terabytes of data over a period of two decades, including highly sensitive information about U.S. intelligence capabilities.  Chelsea Manning: In 2010, Manning, a former U.S. Army soldier, leaked classified documents to Wikileaks that included diplomatic cables, military reports, and other sensitive information. Manning was convicted of espionage and other charges and sentenced to 35 years in prison, although her sentence was later commuted by President Barack Obama.  Harold T. Martin III: In 2020, Martin, a former contractor for the National Security Agency (NSA), was sentenced to nine years in prison for stealing classified information from the agency. The stolen data included hacking tools and other sensitive information that Martin had stored on his personal devices. 3. Physical attacks: Physical attacks on critical infrastructure, such as sabotage or destruction of equipment, can also pose significant cybersecurity risks. Examples include:  Sabotage: This involves intentionally damaging or destroying critical infrastructure assets, such as by planting explosives near a key bridge or dam.  Theft: This involves stealing critical infrastructure assets or materials, such as copper wiring from a power substation or fuel from an oil refinery.  Vandalism: This involves damaging or defacing critical infrastructure assets, such as by graffiti or destruction of communication lines. Physical attacks on critical infrastructure can have serious consequences, including loss of life, environmental damage, and economic disruption. It's important for organizations responsible for critical infrastructure to have physical security measures in place to prevent and respond to physical attacks. These measures may include surveillance cameras, physical barriers, access controls, and emergency response plans.
  • 4. 4. Social engineering: This involves manipulating people into divulging sensitive information or taking actions that compromise security. Phishing is a primary example of such manipulation and is still one of the most prevalent types of attack. According to the 2021 Data Breach Investigations Report by Verizon, phishing was involved in 36% of all data breaches, making it the top threat action in the report. Phishing attacks are also becoming increasingly sophisticated and targeted, with attackers using social engineering tactics to trick victims into divulging sensitive information or downloading malware. This can include impersonating trusted individuals or organizations, creating convincing fake websites or emails, and using urgent or threatening language to pressure victims into taking action. According to the 2021 State of the Phish Report by Proofpoint, 75% of organizations surveyed reported being targeted by phishing attacks in 2020, and 59% of those attacks were successful in compromising at least one user account or system. The report also found that COVID-19 related phishing attacks were particularly prevalent in 2020, taking advantage of the pandemic to trick victims into providing personal information or downloading malware. 5. Distributed denial of service (DDoS) attacks: These attacks flood a system with traffic, overwhelming it and causing it to crash or become unavailable. 6. Advanced persistent threats (APTs): APTs are sophisticated, long-term attacks that target specific organizations and can involve multiple stages of infiltration and exfiltration. According to the 2023 CrowdStrike Global Threat Report, An uptick in social engineering tactics targeting human interactions – Tactics such as vishing direct victims to download malware and SIM swapping to circumvent multi-factor authentication (MFA). Epilogue: If you have thoughts and ideas on how to improve security for critical infrastructure I would love to hear them. In the meantime, here is a presentation on why power plants are particularly vulnerable to cyber threats. https://www.youtube.com/watch?v=rCG-WaLGFQw