SlideShare a Scribd company logo
Potential Impact of Cyber Attacks on
Critical Infrastructure
John S Kendall
Director of Public Sector and Security Programs
Unisys Asia-Pacific
Outline

Cyber Attacks on Critical Infrastructure
What all the fuss about?

What are the real threats?
Who is responsible for taking
what actions?
© 2012 Unisys Corporation. All rights reserved.

2
What is “critical infrastructure”?

The Australian, State and Territory governments define
critical infrastructure as:
“Those physical facilities, supply chains, information
technologies and communication networks which, if
destroyed, degraded or rendered unavailable for an
extended period, would significantly impact on the
social or economic wellbeing of the nation or affect
Australia’s ability to conduct national defence and
ensure national security.”
Source: Australian Government Critical Infrastructure Resilience Strategy

© 2012 Unisys Corporation. All rights reserved.

3
What is “critical infrastructure” for business?
For which extended
disruption or destruction
would seriously
impact or
jeopardise

 Physical facilities

 IT facilities
 Networks
 Services
 Assets






Health
Safety
Security
Economic well-being
Effective functioning

of the business, employees,
channel partners or customers
© 2012 Unisys Corporation. All rights reserved.

4
What is “critical infrastructure”?
Physical Infrastructure
•

Power production/distribution

•

Refineries and critical manufacturing

•

Water supplies

•

Transportation systems

•

Communication networks

Physical Threats
• Armed attacks
• Bombs
• Sabotage

Cyber Infrastructure
•

Internet

•

Critical information systems

•

Online business/financial services

Cyber Threats
• Malware
• Denial of Service
• Data Breach

© 2012 Unisys Corporation. All rights reserved.

5
What is “critical infrastructure”?
Physical Infrastructure

Cyber-Physical Infrastructure

•

Power production/distribution
Physical Threats

•

Power production / distribution

•

Refineries and critical manufacturing
• Armed attacks

•

Refineries and critical manufacturing

•

WaterBombs
• supplies

•

Water Supplies

•

• Sabotage
Transportation systems

•

Transportation systems

•

Communication networks

•

Communication networks

•

Cars

•

Airplanes

•

Medical devices / systems

Cyber Infrastructure
•
•

Internet Threats
Cyber
Critical information systems
• Malware

•

Online business/financial services
• Denial of Service

• Data Breach

© 2012 Unisys Corporation. All rights reserved.

6
Impact of Critical Infrastructure Outages
Public Concerns
Major impact from
2-day outage

Infrastructure
Electricity supply in your city/region

84%

Water supply in your city/region

80%

Banking systems such as ATM & EFTPOS

60%

Mobile phone network

46%

Internet

46%

Public transport network

27%

Major thoroughfare such as Sydney Harbour Bridge

20%

Capital city airport

17%
Source: Unisys Security Index Research 2012
© 2012 Unisys Corporation. All rights reserved.

7
Impact of Critical Infrastructure Outages
Public Concerns
Government Concerns
– National security
– National economy

© 2012 Unisys Corporation. All rights reserved.

8
Impact of Critical Infrastructure Outages
Public Concerns
Government Concerns
Business Concerns
–
–
–
–

Business Operations Impact
Financial Impact
Supply Chain Impact
Business Reputation Impact

© 2012 Unisys Corporation. All rights reserved.

9
Impact of Critical Infrastructure Outages
Public Concerns
Government Concerns
Business Concerns
Cascade Effect
– Interconnectedness of systems creates
risk of cascade effect. For example…
Extended power failure
Gas and oil pipeline outage
Petrol supply shortfall
Transportation / logistics shutdown
Exhaust just-in-time inventories for
hospitals, manufacturers…
© 2012 Unisys Corporation. All rights reserved.

10
What are the threats to your infrastructure?

• Traditional Physical Threats
– Destruction / Damage / Disruption
– Natural disaster / Accidental / Deliberate

© 2012 Unisys Corporation. All rights reserved.

11
What are the threats to your infrastructure?

• Traditional Physical Threats
– Destruction / Damage / Disruption
– Natural disaster / Accidental / Deliberate

• Traditional Cyber Threats
–
–
–
–

Accidental breaches
External hacks
Denial of Service
Virus / worm infiltration

© 2012 Unisys Corporation. All rights reserved.

12
What are the threats to your infrastructure?

• Traditional Physical Threats
– Destruction / Damage / Disruption
– Natural disaster / Accidental / Deliberate

• Traditional Cyber Threats
–
–
–
–

Accidental breaches
External hacks
Denial of Service
Virus / worm infiltration

• Cyber-Physical Threats
– All of the above
– Often more susceptible to physical and cyber attacks than purely
physical or purely cyber infrastructures
© 2012 Unisys Corporation. All rights reserved.

13
What makes Cyber-Physical systems so vulnerable?
• Tempting Target:
– Fragility of cyber-physical systems
– Ability to “strike from afar”
– Low “cost of entry”

• Inadequate security practices
– “Poor cousin” to both physical and cyber specialists
– Careless inattention to the basics (authentication practices)
– Lack of user security training

• Intentional interconnectedness  Unintended vulnerabilities
– Internet access for remote support/maintenance can be exploited by hackers
– Integration of systems across facilities, companies, locations – often using
insecure networking protocols (e.g., MODBUS)

• Long system lifespans without modernising security mechanisms:
– Lack of upgrades may be due to limited memory / processor capability
– Original system supplier may no longer exist – so no ongoing support
– Need for continuous operations prevents system changes or upgrades
© 2012 Unisys Corporation. All rights reserved.

14
Evidence to support this fear
Reported Attacks on US Critical Infrastructure

400
350
US Critical Infrastructure Targets
Postal/Shipping
1%

Public Health
1%

300

250
200

Commercial
Facilities
3%

Energy
54%
Nuclear
3%

150
100
50

Govt Facilities
4%

0
Water
4%

2010

InfoTech
4%

2011

2012

2013*

* Projection based on
6 months data

Communications
5%
Transportation
5%

Critical Mfg
16%

Source: US Dept of Homeland Security ICS-CERT
© 2012 Unisys Corporation. All rights reserved.

15
Evidence to support this fear: “Honeypot” test

North Korea, 2%
Croatia, 2%
Chile, 2%
Palestinian
Territory, 2%
Vietman, 2%
Poland, 2%
Japan, 2%

China, 35%

“Honeypot” emulates several
types of ICS/SCADA devices
and mimics those that are
commonly internet facing –
with traditional vulnerabilities
found across similar systems.
First attack occurred 18
hours after the honeypot
was activated.

Netherlands, 2%
Brazil, 4%

US, 19%
Russia,
6%

And over the next 28 days,
attacks originated from the
following countries

UK, 8%
Laos, 12%

Source: Trend Micro Incorporated Research Paper “Who’s Really Attacking your ICS Equipment”, Author Kyle Wilhoit
© 2012 Unisys Corporation. All rights reserved.

16
Recent cyber attacks on Critical Infrastructure
Stuxnet Malware (2010-2012)
• Sophisticated attack on nuclear manufacturing facilities in Iran
• US/Israel malware exploits vulnerabilities in Microsoft Windows

Power Plant (2012)
• Plant shut down for three days after technician unknowingly inserts virus infected USB disk
• US Dept of Homeland Security declines to share additional information

Water Supply (2011)
• Critical pump damaged by Russian hackers
• Cycled pump on/off until it burned out

Rail Network (2011)
• Hackers manipulated railway company computer systems
• Disrupted rail service – could have been much worse

Chemical Plant (2011)
• PoisonIvy malware infected systems at more than 48 chemical and defense companies
• Source of attack traced back to China

© 2012 Unisys Corporation. All rights reserved.

17
Who is responsible for fixing this?

• Government?
– Regulations / Legislations / Standards
– Information Sharing
– Research

• Suppliers of CPS systems?
– Address/fix security vulnerabilities
– Best practices for implementation
– Design enhanced security into new releases

• Organisations that implement and use CPS!!
– Primary responsibility!

© 2012 Unisys Corporation. All rights reserved.

18
What actions does my company need to take?
• Assume someone is actively attempting to infiltrate your systems
(both information systems and cyber-physical systems)
• Identify vulnerabilities with security assessments of all systems
–
–
–
–
–

Internet connections / VPN access
Aging operating systems and applications
“Auto run” settings for USB devices
Poorly configured firewalls
Inadequate access controls

• Include security as key design feature in new/updated systems
• Don’t work in isolation
– Government-Business Partnership: Trusted Information Sharing Network
(TISN) and Critical Infrastructure Advisory Council (CIAG)
– Industry Segment User Groups

• Education/training
– Awareness of the threat and individual responsibilities
© 2012 Unisys Corporation. All rights reserved.

19
Thank you and
Good Luck!

John S Kendall
Public Sector and Security Program Director
Asia-Pacific Region

Unisys
Unisys Australia Pty Limited
Equinox 2, Level 1
70 Kent Street
Deakin ACT 2600 Australia
john.kendall@unisys.com

Office:
Direct:
Mobile:
Fax:

1300 088 833
+61 2 6274 3571
+61 424 152 034
+61 2 6274 3533

© 2012 Unisys Corporation. All rights reserved.

20

More Related Content

What's hot

Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
Marlabs
 
IT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOsIT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOs
Community Protection Forum
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber Essentials
Jisc
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
Ersoy AKSOY
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
Ahmed Ayman
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
FellowBuddy.com
 
SOAR and SIEM.pptx
SOAR and SIEM.pptxSOAR and SIEM.pptx
SOAR and SIEM.pptx
Ajit Wadhawan
 
Security risk management
Security risk managementSecurity risk management
Security risk management
G Prachi
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
Evolve IP
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
Siemplify
 
Information Security Policies and Standards
Information Security Policies and StandardsInformation Security Policies and Standards
Information Security Policies and Standards
Directorate of Information Security | Ditjen Aptika
 
Security Awareness & Training
Security Awareness & TrainingSecurity Awareness & Training
Security Awareness & Training
novemberchild
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Security policy
Security policySecurity policy
Security policy
Dhani Ahmad
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
Mostafa Elgamala
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
Daniel P Wallace
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
primeteacher32
 
Security architecture
Security architectureSecurity architecture
Security architecture
Duncan Unwin
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
Michael Nickle
 

What's hot (20)

Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
IT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOsIT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOs
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber Essentials
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
SOAR and SIEM.pptx
SOAR and SIEM.pptxSOAR and SIEM.pptx
SOAR and SIEM.pptx
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
Information Security Policies and Standards
Information Security Policies and StandardsInformation Security Policies and Standards
Information Security Policies and Standards
 
Security Awareness & Training
Security Awareness & TrainingSecurity Awareness & Training
Security Awareness & Training
 
IT infrastructure security 101
IT infrastructure security 101IT infrastructure security 101
IT infrastructure security 101
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Security policy
Security policySecurity policy
Security policy
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
Security architecture
Security architectureSecurity architecture
Security architecture
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 

Viewers also liked

Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challenges
Community Protection Forum
 
Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...
Enrique Martin
 
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall StreetCybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall StreetJuniper Networks
 
Cyber-Attacks & SAP systems: Is Our Business-Critical Infrastructure Exposed?
Cyber-Attacks & SAP systems: Is Our Business-Critical Infrastructure Exposed?Cyber-Attacks & SAP systems: Is Our Business-Critical Infrastructure Exposed?
Cyber-Attacks & SAP systems: Is Our Business-Critical Infrastructure Exposed?michelemanzotti
 
A Cyber Infrastructure SCADA Testbed Environment for Research on the Nation\'...
A Cyber Infrastructure SCADA Testbed Environment for Research on the Nation\'...A Cyber Infrastructure SCADA Testbed Environment for Research on the Nation\'...
A Cyber Infrastructure SCADA Testbed Environment for Research on the Nation\'...
Christopher Klaus
 
How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabri...
How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabri...How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabri...
How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabri...
CODE BLUE
 
OnionBots: Subverting Privacy Infrastructure for Cyber Attacks
OnionBots: Subverting Privacy Infrastructure for Cyber AttacksOnionBots: Subverting Privacy Infrastructure for Cyber Attacks
OnionBots: Subverting Privacy Infrastructure for Cyber Attacks
Amirali Sanatinia
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your Business
Lucy Denver
 
Hacking Critical Infrastructure Like You’re Not a N00b
Hacking Critical Infrastructure Like You’re Not a N00bHacking Critical Infrastructure Like You’re Not a N00b
Hacking Critical Infrastructure Like You’re Not a N00b
Priyanka Aash
 
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015tmuehleisen
 
DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Securitydocomusa
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2Kyle Lai
 
VIVA LA COMPLEJIDAD ! BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...
VIVA LA COMPLEJIDAD !  BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...VIVA LA COMPLEJIDAD !  BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...
VIVA LA COMPLEJIDAD ! BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...
Carlos Moreno
 
Presentation
Presentation Presentation
Presentation
smarcos2119
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation Sector
European Services Institute
 
Présentation Cyber espace
Présentation Cyber espacePrésentation Cyber espace
Présentation Cyber espaceadelvigne
 
Sécuriser son espace Cyber-base face aux usages illicites - ExplorCamp (2009)
Sécuriser son espace Cyber-base face aux usages illicites - ExplorCamp (2009)Sécuriser son espace Cyber-base face aux usages illicites - ExplorCamp (2009)
Sécuriser son espace Cyber-base face aux usages illicites - ExplorCamp (2009)
Ardesi Midi-Pyrénées
 
Aerospace Defense Cyber Security Executive Search
Aerospace Defense Cyber Security Executive SearchAerospace Defense Cyber Security Executive Search
Aerospace Defense Cyber Security Executive Search
NextGen Global Executive Search
 
Pirater un compte facebook
Pirater un compte facebookPirater un compte facebook
Pirater un compte facebook
zabakpolak
 
Cyber defense: Understanding and Combating the Threat
Cyber defense: Understanding and Combating the ThreatCyber defense: Understanding and Combating the Threat
Cyber defense: Understanding and Combating the Threat
IBM Government
 

Viewers also liked (20)

Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challenges
 
Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...
 
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall StreetCybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
 
Cyber-Attacks & SAP systems: Is Our Business-Critical Infrastructure Exposed?
Cyber-Attacks & SAP systems: Is Our Business-Critical Infrastructure Exposed?Cyber-Attacks & SAP systems: Is Our Business-Critical Infrastructure Exposed?
Cyber-Attacks & SAP systems: Is Our Business-Critical Infrastructure Exposed?
 
A Cyber Infrastructure SCADA Testbed Environment for Research on the Nation\'...
A Cyber Infrastructure SCADA Testbed Environment for Research on the Nation\'...A Cyber Infrastructure SCADA Testbed Environment for Research on the Nation\'...
A Cyber Infrastructure SCADA Testbed Environment for Research on the Nation\'...
 
How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabri...
How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabri...How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabri...
How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabri...
 
OnionBots: Subverting Privacy Infrastructure for Cyber Attacks
OnionBots: Subverting Privacy Infrastructure for Cyber AttacksOnionBots: Subverting Privacy Infrastructure for Cyber Attacks
OnionBots: Subverting Privacy Infrastructure for Cyber Attacks
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your Business
 
Hacking Critical Infrastructure Like You’re Not a N00b
Hacking Critical Infrastructure Like You’re Not a N00bHacking Critical Infrastructure Like You’re Not a N00b
Hacking Critical Infrastructure Like You’re Not a N00b
 
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
 
DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Security
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
 
VIVA LA COMPLEJIDAD ! BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...
VIVA LA COMPLEJIDAD !  BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...VIVA LA COMPLEJIDAD !  BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...
VIVA LA COMPLEJIDAD ! BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...
 
Presentation
Presentation Presentation
Presentation
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation Sector
 
Présentation Cyber espace
Présentation Cyber espacePrésentation Cyber espace
Présentation Cyber espace
 
Sécuriser son espace Cyber-base face aux usages illicites - ExplorCamp (2009)
Sécuriser son espace Cyber-base face aux usages illicites - ExplorCamp (2009)Sécuriser son espace Cyber-base face aux usages illicites - ExplorCamp (2009)
Sécuriser son espace Cyber-base face aux usages illicites - ExplorCamp (2009)
 
Aerospace Defense Cyber Security Executive Search
Aerospace Defense Cyber Security Executive SearchAerospace Defense Cyber Security Executive Search
Aerospace Defense Cyber Security Executive Search
 
Pirater un compte facebook
Pirater un compte facebookPirater un compte facebook
Pirater un compte facebook
 
Cyber defense: Understanding and Combating the Threat
Cyber defense: Understanding and Combating the ThreatCyber defense: Understanding and Combating the Threat
Cyber defense: Understanding and Combating the Threat
 

Similar to Potential Impact of Cyber Attacks on Critical Infrastructure

amrapali builders -- maroochy water-services-case-study briefing.pdf
amrapali builders -- maroochy water-services-case-study briefing.pdfamrapali builders -- maroochy water-services-case-study briefing.pdf
amrapali builders -- maroochy water-services-case-study briefing.pdf
amrapalibuildersreviews
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond Compliance
EnergySec
 
Network Security for Computer science and Engineering.ppt
Network Security for Computer science and Engineering.pptNetwork Security for Computer science and Engineering.ppt
Network Security for Computer science and Engineering.ppt
AkfeteAssefa
 
Strengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfStrengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdf
ssuserc1c354
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
Ahmed Habib
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
itnewsafrica
 
Pharmaceutical companies and security
Pharmaceutical companies and securityPharmaceutical companies and security
Pharmaceutical companies and security
Juliette Foine
 
The importance of cie in the digital era
The importance of cie in the digital eraThe importance of cie in the digital era
The importance of cie in the digital era
Ricardo de Almeida
 
Cybersecurity Critical Infrastructure Threats and Examples 2022- Presentation...
Cybersecurity Critical Infrastructure Threats and Examples 2022- Presentation...Cybersecurity Critical Infrastructure Threats and Examples 2022- Presentation...
Cybersecurity Critical Infrastructure Threats and Examples 2022- Presentation...
Certrec
 
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillEliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillTheAnfieldGroup
 
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
EnergySec
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
IBM Security
 
Security in Large, Strategic and Complex Systems: Challenges and Solutions_Li...
Security in Large, Strategic and Complex Systems: Challenges and Solutions_Li...Security in Large, Strategic and Complex Systems: Challenges and Solutions_Li...
Security in Large, Strategic and Complex Systems: Challenges and Solutions_Li...
Marco Lisi
 
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMSSECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
Marco Lisi
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
Intel® Software
 
Information systems security_awareness_fy10
Information systems security_awareness_fy10Information systems security_awareness_fy10
Information systems security_awareness_fy10Wesen Tegegne
 
The Information Disruption Industry and the Operational Environment of the Fu...
The Information Disruption Industry and the Operational Environment of the Fu...The Information Disruption Industry and the Operational Environment of the Fu...
The Information Disruption Industry and the Operational Environment of the Fu...
Vincent O'Neil
 
Critical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiCritical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh Belgi
ClubHack
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
Community Protection Forum
 

Similar to Potential Impact of Cyber Attacks on Critical Infrastructure (20)

amrapali builders -- maroochy water-services-case-study briefing.pdf
amrapali builders -- maroochy water-services-case-study briefing.pdfamrapali builders -- maroochy water-services-case-study briefing.pdf
amrapali builders -- maroochy water-services-case-study briefing.pdf
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond Compliance
 
Network Security for Computer science and Engineering.ppt
Network Security for Computer science and Engineering.pptNetwork Security for Computer science and Engineering.ppt
Network Security for Computer science and Engineering.ppt
 
Strengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfStrengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdf
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Pharmaceutical companies and security
Pharmaceutical companies and securityPharmaceutical companies and security
Pharmaceutical companies and security
 
Session 5.2 Martin Koyabe
Session 5.2 Martin KoyabeSession 5.2 Martin Koyabe
Session 5.2 Martin Koyabe
 
The importance of cie in the digital era
The importance of cie in the digital eraThe importance of cie in the digital era
The importance of cie in the digital era
 
Cybersecurity Critical Infrastructure Threats and Examples 2022- Presentation...
Cybersecurity Critical Infrastructure Threats and Examples 2022- Presentation...Cybersecurity Critical Infrastructure Threats and Examples 2022- Presentation...
Cybersecurity Critical Infrastructure Threats and Examples 2022- Presentation...
 
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillEliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
 
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
Security in Large, Strategic and Complex Systems: Challenges and Solutions_Li...
Security in Large, Strategic and Complex Systems: Challenges and Solutions_Li...Security in Large, Strategic and Complex Systems: Challenges and Solutions_Li...
Security in Large, Strategic and Complex Systems: Challenges and Solutions_Li...
 
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMSSECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
Information systems security_awareness_fy10
Information systems security_awareness_fy10Information systems security_awareness_fy10
Information systems security_awareness_fy10
 
The Information Disruption Industry and the Operational Environment of the Fu...
The Information Disruption Industry and the Operational Environment of the Fu...The Information Disruption Industry and the Operational Environment of the Fu...
The Information Disruption Industry and the Operational Environment of the Fu...
 
Critical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiCritical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh Belgi
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
 

More from Unisys Corporation

Elevate™ by Unisys
Elevate™ by UnisysElevate™ by Unisys
Elevate™ by Unisys
Unisys Corporation
 
Unisys Integrated Medical Device Management - Executive Brief
Unisys Integrated Medical Device Management - Executive BriefUnisys Integrated Medical Device Management - Executive Brief
Unisys Integrated Medical Device Management - Executive Brief
Unisys Corporation
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by Design
Unisys Corporation
 
Digital Generation CPG (German)
Digital Generation CPG (German)Digital Generation CPG (German)
Digital Generation CPG (German)
Unisys Corporation
 
Digital Generation CPG UK
Digital Generation CPG UKDigital Generation CPG UK
Digital Generation CPG UK
Unisys Corporation
 
SURVEY RESULTS: ACCELERATING INNOVATION AND THE DIGITAL JOURNEY - INFOGRAPHIC
SURVEY RESULTS: ACCELERATING INNOVATION AND THE DIGITAL JOURNEY - INFOGRAPHICSURVEY RESULTS: ACCELERATING INNOVATION AND THE DIGITAL JOURNEY - INFOGRAPHIC
SURVEY RESULTS: ACCELERATING INNOVATION AND THE DIGITAL JOURNEY - INFOGRAPHIC
Unisys Corporation
 
Unisys Client 360
Unisys Client 360Unisys Client 360
Unisys Client 360
Unisys Corporation
 
Stealth Secures Along Every Step of Your Journey Infographic
Stealth Secures Along Every Step of Your Journey InfographicStealth Secures Along Every Step of Your Journey Infographic
Stealth Secures Along Every Step of Your Journey Infographic
Unisys Corporation
 
DAS DILEMMA MIT DER GENERATION „DIGITAL“
DAS DILEMMA MIT DER GENERATION „DIGITAL“DAS DILEMMA MIT DER GENERATION „DIGITAL“
DAS DILEMMA MIT DER GENERATION „DIGITAL“
Unisys Corporation
 
DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...
DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...
DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...
Unisys Corporation
 
STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...
STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...
STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...
Unisys Corporation
 
DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN.
 DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN. DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN.
DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN.
Unisys Corporation
 
Digital Gen: Hybrid IT Infographic
Digital Gen: Hybrid IT Infographic Digital Gen: Hybrid IT Infographic
Digital Gen: Hybrid IT Infographic
Unisys Corporation
 
Digital Gen Infographic
Digital Gen InfographicDigital Gen Infographic
Digital Gen Infographic
Unisys Corporation
 
Digital Gen: Security Infographic
Digital Gen: Security InfographicDigital Gen: Security Infographic
Digital Gen: Security Infographic
Unisys Corporation
 
Digital Gen: End User Services Infographic
Digital Gen: End User Services InfographicDigital Gen: End User Services Infographic
Digital Gen: End User Services Infographic
Unisys Corporation
 
​​Unisys Stealth(cloud)™ for Azure Infographic
​​Unisys Stealth(cloud)™ for Azure Infographic​​Unisys Stealth(cloud)™ for Azure Infographic
​​Unisys Stealth(cloud)™ for Azure Infographic
Unisys Corporation
 
Managed Security Services Infographic
Managed Security Services InfographicManaged Security Services Infographic
Managed Security Services Infographic
Unisys Corporation
 
Unisys Stealth Industries Infographic
Unisys Stealth Industries InfographicUnisys Stealth Industries Infographic
Unisys Stealth Industries Infographic
Unisys Corporation
 
Digital Generation Infographic
Digital Generation InfographicDigital Generation Infographic
Digital Generation Infographic
Unisys Corporation
 

More from Unisys Corporation (20)

Elevate™ by Unisys
Elevate™ by UnisysElevate™ by Unisys
Elevate™ by Unisys
 
Unisys Integrated Medical Device Management - Executive Brief
Unisys Integrated Medical Device Management - Executive BriefUnisys Integrated Medical Device Management - Executive Brief
Unisys Integrated Medical Device Management - Executive Brief
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by Design
 
Digital Generation CPG (German)
Digital Generation CPG (German)Digital Generation CPG (German)
Digital Generation CPG (German)
 
Digital Generation CPG UK
Digital Generation CPG UKDigital Generation CPG UK
Digital Generation CPG UK
 
SURVEY RESULTS: ACCELERATING INNOVATION AND THE DIGITAL JOURNEY - INFOGRAPHIC
SURVEY RESULTS: ACCELERATING INNOVATION AND THE DIGITAL JOURNEY - INFOGRAPHICSURVEY RESULTS: ACCELERATING INNOVATION AND THE DIGITAL JOURNEY - INFOGRAPHIC
SURVEY RESULTS: ACCELERATING INNOVATION AND THE DIGITAL JOURNEY - INFOGRAPHIC
 
Unisys Client 360
Unisys Client 360Unisys Client 360
Unisys Client 360
 
Stealth Secures Along Every Step of Your Journey Infographic
Stealth Secures Along Every Step of Your Journey InfographicStealth Secures Along Every Step of Your Journey Infographic
Stealth Secures Along Every Step of Your Journey Infographic
 
DAS DILEMMA MIT DER GENERATION „DIGITAL“
DAS DILEMMA MIT DER GENERATION „DIGITAL“DAS DILEMMA MIT DER GENERATION „DIGITAL“
DAS DILEMMA MIT DER GENERATION „DIGITAL“
 
DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...
DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...
DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...
 
STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...
STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...
STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...
 
DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN.
 DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN. DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN.
DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN.
 
Digital Gen: Hybrid IT Infographic
Digital Gen: Hybrid IT Infographic Digital Gen: Hybrid IT Infographic
Digital Gen: Hybrid IT Infographic
 
Digital Gen Infographic
Digital Gen InfographicDigital Gen Infographic
Digital Gen Infographic
 
Digital Gen: Security Infographic
Digital Gen: Security InfographicDigital Gen: Security Infographic
Digital Gen: Security Infographic
 
Digital Gen: End User Services Infographic
Digital Gen: End User Services InfographicDigital Gen: End User Services Infographic
Digital Gen: End User Services Infographic
 
​​Unisys Stealth(cloud)™ for Azure Infographic
​​Unisys Stealth(cloud)™ for Azure Infographic​​Unisys Stealth(cloud)™ for Azure Infographic
​​Unisys Stealth(cloud)™ for Azure Infographic
 
Managed Security Services Infographic
Managed Security Services InfographicManaged Security Services Infographic
Managed Security Services Infographic
 
Unisys Stealth Industries Infographic
Unisys Stealth Industries InfographicUnisys Stealth Industries Infographic
Unisys Stealth Industries Infographic
 
Digital Generation Infographic
Digital Generation InfographicDigital Generation Infographic
Digital Generation Infographic
 

Recently uploaded

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 

Recently uploaded (20)

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 

Potential Impact of Cyber Attacks on Critical Infrastructure

  • 1. Potential Impact of Cyber Attacks on Critical Infrastructure John S Kendall Director of Public Sector and Security Programs Unisys Asia-Pacific
  • 2. Outline Cyber Attacks on Critical Infrastructure What all the fuss about? What are the real threats? Who is responsible for taking what actions? © 2012 Unisys Corporation. All rights reserved. 2
  • 3. What is “critical infrastructure”? The Australian, State and Territory governments define critical infrastructure as: “Those physical facilities, supply chains, information technologies and communication networks which, if destroyed, degraded or rendered unavailable for an extended period, would significantly impact on the social or economic wellbeing of the nation or affect Australia’s ability to conduct national defence and ensure national security.” Source: Australian Government Critical Infrastructure Resilience Strategy © 2012 Unisys Corporation. All rights reserved. 3
  • 4. What is “critical infrastructure” for business? For which extended disruption or destruction would seriously impact or jeopardise  Physical facilities  IT facilities  Networks  Services  Assets      Health Safety Security Economic well-being Effective functioning of the business, employees, channel partners or customers © 2012 Unisys Corporation. All rights reserved. 4
  • 5. What is “critical infrastructure”? Physical Infrastructure • Power production/distribution • Refineries and critical manufacturing • Water supplies • Transportation systems • Communication networks Physical Threats • Armed attacks • Bombs • Sabotage Cyber Infrastructure • Internet • Critical information systems • Online business/financial services Cyber Threats • Malware • Denial of Service • Data Breach © 2012 Unisys Corporation. All rights reserved. 5
  • 6. What is “critical infrastructure”? Physical Infrastructure Cyber-Physical Infrastructure • Power production/distribution Physical Threats • Power production / distribution • Refineries and critical manufacturing • Armed attacks • Refineries and critical manufacturing • WaterBombs • supplies • Water Supplies • • Sabotage Transportation systems • Transportation systems • Communication networks • Communication networks • Cars • Airplanes • Medical devices / systems Cyber Infrastructure • • Internet Threats Cyber Critical information systems • Malware • Online business/financial services • Denial of Service • Data Breach © 2012 Unisys Corporation. All rights reserved. 6
  • 7. Impact of Critical Infrastructure Outages Public Concerns Major impact from 2-day outage Infrastructure Electricity supply in your city/region 84% Water supply in your city/region 80% Banking systems such as ATM & EFTPOS 60% Mobile phone network 46% Internet 46% Public transport network 27% Major thoroughfare such as Sydney Harbour Bridge 20% Capital city airport 17% Source: Unisys Security Index Research 2012 © 2012 Unisys Corporation. All rights reserved. 7
  • 8. Impact of Critical Infrastructure Outages Public Concerns Government Concerns – National security – National economy © 2012 Unisys Corporation. All rights reserved. 8
  • 9. Impact of Critical Infrastructure Outages Public Concerns Government Concerns Business Concerns – – – – Business Operations Impact Financial Impact Supply Chain Impact Business Reputation Impact © 2012 Unisys Corporation. All rights reserved. 9
  • 10. Impact of Critical Infrastructure Outages Public Concerns Government Concerns Business Concerns Cascade Effect – Interconnectedness of systems creates risk of cascade effect. For example… Extended power failure Gas and oil pipeline outage Petrol supply shortfall Transportation / logistics shutdown Exhaust just-in-time inventories for hospitals, manufacturers… © 2012 Unisys Corporation. All rights reserved. 10
  • 11. What are the threats to your infrastructure? • Traditional Physical Threats – Destruction / Damage / Disruption – Natural disaster / Accidental / Deliberate © 2012 Unisys Corporation. All rights reserved. 11
  • 12. What are the threats to your infrastructure? • Traditional Physical Threats – Destruction / Damage / Disruption – Natural disaster / Accidental / Deliberate • Traditional Cyber Threats – – – – Accidental breaches External hacks Denial of Service Virus / worm infiltration © 2012 Unisys Corporation. All rights reserved. 12
  • 13. What are the threats to your infrastructure? • Traditional Physical Threats – Destruction / Damage / Disruption – Natural disaster / Accidental / Deliberate • Traditional Cyber Threats – – – – Accidental breaches External hacks Denial of Service Virus / worm infiltration • Cyber-Physical Threats – All of the above – Often more susceptible to physical and cyber attacks than purely physical or purely cyber infrastructures © 2012 Unisys Corporation. All rights reserved. 13
  • 14. What makes Cyber-Physical systems so vulnerable? • Tempting Target: – Fragility of cyber-physical systems – Ability to “strike from afar” – Low “cost of entry” • Inadequate security practices – “Poor cousin” to both physical and cyber specialists – Careless inattention to the basics (authentication practices) – Lack of user security training • Intentional interconnectedness  Unintended vulnerabilities – Internet access for remote support/maintenance can be exploited by hackers – Integration of systems across facilities, companies, locations – often using insecure networking protocols (e.g., MODBUS) • Long system lifespans without modernising security mechanisms: – Lack of upgrades may be due to limited memory / processor capability – Original system supplier may no longer exist – so no ongoing support – Need for continuous operations prevents system changes or upgrades © 2012 Unisys Corporation. All rights reserved. 14
  • 15. Evidence to support this fear Reported Attacks on US Critical Infrastructure 400 350 US Critical Infrastructure Targets Postal/Shipping 1% Public Health 1% 300 250 200 Commercial Facilities 3% Energy 54% Nuclear 3% 150 100 50 Govt Facilities 4% 0 Water 4% 2010 InfoTech 4% 2011 2012 2013* * Projection based on 6 months data Communications 5% Transportation 5% Critical Mfg 16% Source: US Dept of Homeland Security ICS-CERT © 2012 Unisys Corporation. All rights reserved. 15
  • 16. Evidence to support this fear: “Honeypot” test North Korea, 2% Croatia, 2% Chile, 2% Palestinian Territory, 2% Vietman, 2% Poland, 2% Japan, 2% China, 35% “Honeypot” emulates several types of ICS/SCADA devices and mimics those that are commonly internet facing – with traditional vulnerabilities found across similar systems. First attack occurred 18 hours after the honeypot was activated. Netherlands, 2% Brazil, 4% US, 19% Russia, 6% And over the next 28 days, attacks originated from the following countries UK, 8% Laos, 12% Source: Trend Micro Incorporated Research Paper “Who’s Really Attacking your ICS Equipment”, Author Kyle Wilhoit © 2012 Unisys Corporation. All rights reserved. 16
  • 17. Recent cyber attacks on Critical Infrastructure Stuxnet Malware (2010-2012) • Sophisticated attack on nuclear manufacturing facilities in Iran • US/Israel malware exploits vulnerabilities in Microsoft Windows Power Plant (2012) • Plant shut down for three days after technician unknowingly inserts virus infected USB disk • US Dept of Homeland Security declines to share additional information Water Supply (2011) • Critical pump damaged by Russian hackers • Cycled pump on/off until it burned out Rail Network (2011) • Hackers manipulated railway company computer systems • Disrupted rail service – could have been much worse Chemical Plant (2011) • PoisonIvy malware infected systems at more than 48 chemical and defense companies • Source of attack traced back to China © 2012 Unisys Corporation. All rights reserved. 17
  • 18. Who is responsible for fixing this? • Government? – Regulations / Legislations / Standards – Information Sharing – Research • Suppliers of CPS systems? – Address/fix security vulnerabilities – Best practices for implementation – Design enhanced security into new releases • Organisations that implement and use CPS!! – Primary responsibility! © 2012 Unisys Corporation. All rights reserved. 18
  • 19. What actions does my company need to take? • Assume someone is actively attempting to infiltrate your systems (both information systems and cyber-physical systems) • Identify vulnerabilities with security assessments of all systems – – – – – Internet connections / VPN access Aging operating systems and applications “Auto run” settings for USB devices Poorly configured firewalls Inadequate access controls • Include security as key design feature in new/updated systems • Don’t work in isolation – Government-Business Partnership: Trusted Information Sharing Network (TISN) and Critical Infrastructure Advisory Council (CIAG) – Industry Segment User Groups • Education/training – Awareness of the threat and individual responsibilities © 2012 Unisys Corporation. All rights reserved. 19
  • 20. Thank you and Good Luck! John S Kendall Public Sector and Security Program Director Asia-Pacific Region Unisys Unisys Australia Pty Limited Equinox 2, Level 1 70 Kent Street Deakin ACT 2600 Australia john.kendall@unisys.com Office: Direct: Mobile: Fax: 1300 088 833 +61 2 6274 3571 +61 424 152 034 +61 2 6274 3533 © 2012 Unisys Corporation. All rights reserved. 20