SlideShare a Scribd company logo
1 of 28
Threats to Critical Infrastructure
Most of the critical infrastructures systems and applications depend on the
existence of the internet. The communication between different governmental
organizations run using the Cyber-network and either wired or wireless
connections. With the increased dependency on the internet systems and
communications, the need for higher and stronger security systems has
emerged. The more we rely on the internet, the more we need for their
security systems to be able to defend us against all types of threats.
Threats to Critical Infrastructure
Threat definition
Threats is the action that may cause harm on different levels of the
organization or may lead to a country-wide catastrophic event. It could
also be responsible for the loss of life, loss of welfare, and loss of main
services that the critical infrastructures rely on. Threats cause damage
in life, money, reputations, and the sense of security. It has shown
recently that threats in some cases had been turned to weapons.
Threat types
Physical Cyber
Human
Physical Threat
A physical threat is a potential cause of an incident that may result in
loss or physical damage to the computer systems. The threats
include fire, unstable power supply, and humidity in the rooms
housing the hardware.
Human Threat
Human threat that targets other humans, hackers, cyber criminals, people
who attempt terrorism.
Cyber threats
Cyber threats that target the software and are initiated from distant places it could cover:
Virus , Spyware
Trojans , Worms
Key loggers , Adware
Denial of Service Attacks
Distributed Denial of Service Attacks
Unauthorized access to computer resources such as data
Phishing
Other Computer Security Risks
Critical Infrastructure Definition
Critical infrastructure refers to main essential and effective environmental
government technologies, systems, processes, facilities, networks, assets and
services. It cover all the countries essential services from security, safety, health or
economic among other vital departments.
It is an asset, located in member country which is essential for the maintenance of
vital societal functions.
Critical Infrastructure Threats
Disruptions, and threats to critical infrastructure damage countries in no time. It
could result in life loss, business collapse, and loss of the main services for life. Since
critical infrastructure depends on an interconnected “system of systems” any
unattended device that cause threat may led to destroy bigger systems.
Threats has great effect on both society and environment.
1 2 3 4 5
Loss life
Loss confident
Less productive
Loss stability in
economic
Loss main services or
halted for a period of
time
Threats impact on society
On the society there are many impacts that must be considered.
1 2 3 4 5
Awareness to the
cause of threats.
Implement
appropriate
security measure.
Notice any change
and inform the
responsible by any
change.
Use strong
password for
devices used.
Follow the
organization security
instructions.
Role of Society for Risk Analysis
What Could Go Wrong? What if?
Road
Energy
Sirens
Water
Telecom
Transportation
Dams
Industry-Government Organizational Structure
16 Critical Infrastructure Sectors & Sector-Specific Agencies
Figure 4.2: Main Players in the Smart Grid context
Who and How
• Who
• Hacktivists
• Insiders
• Criminals
• Terrorist
• Nations
• How
• SQL injection
• BotNet
• Phishing
• Social Media
• Infected Websites
Why is there concern?
• Why - Attacks • Why - Cost
• 2016 there was 1093
breaches
• 36,601,939 records
• 19,699,094 ssns
• 7,472,540 credit cards
• @$250 =
$9,150,484,750 cost to
organizations
Cyber Investigations 15/Day
Trojan Attempts 3000/Day
SQL Injection 50/Day
SPAM 100K/Day
Web Activity 8.3M/Month
Community Impact of Cyber
• Motivations and attacks
2016 Cybersecurity Trends
24
• Denial of Service (DoS/DDoS):
• Extortion, Fun, Punishment, Competition
• Ransomware:
• Extortion, some Punishment
• Data Theft:
• Sales, Espionage, Identity Theft, Fun, Embarrassment
• Credential Theft:
• Sales of credentials, credential reuse, password list
aggregation
• Botnets:
DDoS, Bitcoin mining, Spam, illegal storage
Layered Security
What
processes
and assets
need
protection?
What
safeguards
are available?
What
techniques
can identify
incidents?
What
techniques
can contain
impacts of
incidents?
What
techniques
can restore
capabilities?
Layered Security (Cont…)
• Remediate – Critical Security
Controls
The Layered Approach
Access Management
PERIMETER
APPLICATION
NETWORK
HOST
DATA Encryption
Access
Control
Input Validation
Host IDs
Vulnerability Assessment
Access Control
Host IDs
Virus Protection
Vulnerability Assessment
Access Control
Intrusion Detection
Intrusion Prevention
Vulnerability Assessment
Access Control
Firewall
VPN
Encryption
Access Control
LAYERED
SECURITY
FRAMEWORK
Defense in Depth
is an Information
Assurance strategy
utilized by Managed
Security Services in which
multiple layers of defense
are placed throughout an
Information Technology
system. It addresses
security vulnerabilities in
personnel, technology and
operations for the duration
of the system's lifecycle.
Critical Infrastructure Risk Management Framework
The elements for the critical infrastructures are the physical, the cyber and the human.
In order to protect the critical infrastructure we must do some steps:

More Related Content

Similar to Meeting04_Threats_to_Critical_Infrastructure.pptx

Exploring Cyber Attack Types: Understanding the Threat Landscape
Exploring Cyber Attack Types: Understanding the Threat LandscapeExploring Cyber Attack Types: Understanding the Threat Landscape
Exploring Cyber Attack Types: Understanding the Threat Landscapecyberprosocial
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav SinghGaurav Singh
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityAndrea Rossetti
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSrausdeen anfas
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisIRJET Journal
 
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh KumarTypes of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh KumarDr.S.Jagadeesh Kumar
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityIllumeo
 
Survey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive MeasuresSurvey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive MeasuresIOSR Journals
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdfSuleiman55
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorismKirti Temani
 
7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdf7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdfPhD Assistance
 
Different Types Of Cyber Security Threats
Different Types Of Cyber Security ThreatsDifferent Types Of Cyber Security Threats
Different Types Of Cyber Security ThreatsDaniel Martin
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxarnoldmeredith47041
 

Similar to Meeting04_Threats_to_Critical_Infrastructure.pptx (20)

Module 1.pdf
Module 1.pdfModule 1.pdf
Module 1.pdf
 
module 1 Cyber Security Concepts
module 1 Cyber Security Conceptsmodule 1 Cyber Security Concepts
module 1 Cyber Security Concepts
 
Exploring Cyber Attack Types: Understanding the Threat Landscape
Exploring Cyber Attack Types: Understanding the Threat LandscapeExploring Cyber Attack Types: Understanding the Threat Landscape
Exploring Cyber Attack Types: Understanding the Threat Landscape
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
 
Brooks18
Brooks18Brooks18
Brooks18
 
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh KumarTypes of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Survey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive MeasuresSurvey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive Measures
 
C018131821
C018131821C018131821
C018131821
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdf
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 
7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdf7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdf
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Different Types Of Cyber Security Threats
Different Types Of Cyber Security ThreatsDifferent Types Of Cyber Security Threats
Different Types Of Cyber Security Threats
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
 

Recently uploaded

Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...makika9823
 
9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings Republik9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings RepublikGenuineGirls
 
Mastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdfMastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdfTirupati Social Media
 
Online Social Shopping Motivation: A Preliminary Study
Online Social Shopping Motivation: A Preliminary StudyOnline Social Shopping Motivation: A Preliminary Study
Online Social Shopping Motivation: A Preliminary StudyAJHSSR Journal
 
Angela Killian | Operations Director | Dallas
Angela Killian | Operations Director | DallasAngela Killian | Operations Director | Dallas
Angela Killian | Operations Director | DallasAngela Killian
 
O9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking MenO9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking MenSapana Sha
 
Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...SocioCosmos
 
Call Girls In Patel Nagar Delhi 9654467111 Escorts Service
Call Girls In Patel Nagar Delhi 9654467111 Escorts ServiceCall Girls In Patel Nagar Delhi 9654467111 Escorts Service
Call Girls In Patel Nagar Delhi 9654467111 Escorts ServiceSapana Sha
 
Call Girls In Noida Mall Of Noida O9654467111 Escorts Serviec
Call Girls In Noida Mall Of Noida O9654467111 Escorts ServiecCall Girls In Noida Mall Of Noida O9654467111 Escorts Serviec
Call Girls In Noida Mall Of Noida O9654467111 Escorts ServiecSapana Sha
 
Unlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.comUnlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.comSagar Sinha
 
Add more information to your upload Tip: Better titles and descriptions lead ...
Add more information to your upload Tip: Better titles and descriptions lead ...Add more information to your upload Tip: Better titles and descriptions lead ...
Add more information to your upload Tip: Better titles and descriptions lead ...SejarahLokal
 
Dubai Call Girls O528786472 Diabolic Call Girls In Dubai
Dubai Call Girls O528786472 Diabolic Call Girls In DubaiDubai Call Girls O528786472 Diabolic Call Girls In Dubai
Dubai Call Girls O528786472 Diabolic Call Girls In Dubaihf8803863
 
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...AJHSSR Journal
 
social media for the hospitality industry.
social media for the hospitality industry.social media for the hospitality industry.
social media for the hospitality industry.japie swanepoel
 
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call Me
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call MeCall^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call Me
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call MeMs Riya
 
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一ra6e69ou
 

Recently uploaded (20)

Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
 
young Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Serviceyoung Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Service
 
Hot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort Service
 
9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings Republik9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings Republik
 
Mastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdfMastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdf
 
Online Social Shopping Motivation: A Preliminary Study
Online Social Shopping Motivation: A Preliminary StudyOnline Social Shopping Motivation: A Preliminary Study
Online Social Shopping Motivation: A Preliminary Study
 
Angela Killian | Operations Director | Dallas
Angela Killian | Operations Director | DallasAngela Killian | Operations Director | Dallas
Angela Killian | Operations Director | Dallas
 
O9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking MenO9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking Men
 
FULL ENJOY Call Girls In Mohammadpur (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Mohammadpur  (Delhi) Call Us 9953056974FULL ENJOY Call Girls In Mohammadpur  (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Mohammadpur (Delhi) Call Us 9953056974
 
Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...
 
Call Girls In Patel Nagar Delhi 9654467111 Escorts Service
Call Girls In Patel Nagar Delhi 9654467111 Escorts ServiceCall Girls In Patel Nagar Delhi 9654467111 Escorts Service
Call Girls In Patel Nagar Delhi 9654467111 Escorts Service
 
Call Girls In Noida Mall Of Noida O9654467111 Escorts Serviec
Call Girls In Noida Mall Of Noida O9654467111 Escorts ServiecCall Girls In Noida Mall Of Noida O9654467111 Escorts Serviec
Call Girls In Noida Mall Of Noida O9654467111 Escorts Serviec
 
Unlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.comUnlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.com
 
Add more information to your upload Tip: Better titles and descriptions lead ...
Add more information to your upload Tip: Better titles and descriptions lead ...Add more information to your upload Tip: Better titles and descriptions lead ...
Add more information to your upload Tip: Better titles and descriptions lead ...
 
Dubai Call Girls O528786472 Diabolic Call Girls In Dubai
Dubai Call Girls O528786472 Diabolic Call Girls In DubaiDubai Call Girls O528786472 Diabolic Call Girls In Dubai
Dubai Call Girls O528786472 Diabolic Call Girls In Dubai
 
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
 
social media for the hospitality industry.
social media for the hospitality industry.social media for the hospitality industry.
social media for the hospitality industry.
 
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call Me
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call MeCall^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call Me
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call Me
 
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Masudpur
Delhi  99530 vip 56974  Genuine Escort Service Call Girls in MasudpurDelhi  99530 vip 56974  Genuine Escort Service Call Girls in Masudpur
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Masudpur
 

Meeting04_Threats_to_Critical_Infrastructure.pptx

  • 1. Threats to Critical Infrastructure
  • 2. Most of the critical infrastructures systems and applications depend on the existence of the internet. The communication between different governmental organizations run using the Cyber-network and either wired or wireless connections. With the increased dependency on the internet systems and communications, the need for higher and stronger security systems has emerged. The more we rely on the internet, the more we need for their security systems to be able to defend us against all types of threats. Threats to Critical Infrastructure
  • 3. Threat definition Threats is the action that may cause harm on different levels of the organization or may lead to a country-wide catastrophic event. It could also be responsible for the loss of life, loss of welfare, and loss of main services that the critical infrastructures rely on. Threats cause damage in life, money, reputations, and the sense of security. It has shown recently that threats in some cases had been turned to weapons.
  • 5. Physical Threat A physical threat is a potential cause of an incident that may result in loss or physical damage to the computer systems. The threats include fire, unstable power supply, and humidity in the rooms housing the hardware.
  • 6. Human Threat Human threat that targets other humans, hackers, cyber criminals, people who attempt terrorism.
  • 7. Cyber threats Cyber threats that target the software and are initiated from distant places it could cover: Virus , Spyware Trojans , Worms Key loggers , Adware Denial of Service Attacks Distributed Denial of Service Attacks Unauthorized access to computer resources such as data Phishing Other Computer Security Risks
  • 8. Critical Infrastructure Definition Critical infrastructure refers to main essential and effective environmental government technologies, systems, processes, facilities, networks, assets and services. It cover all the countries essential services from security, safety, health or economic among other vital departments. It is an asset, located in member country which is essential for the maintenance of vital societal functions.
  • 9. Critical Infrastructure Threats Disruptions, and threats to critical infrastructure damage countries in no time. It could result in life loss, business collapse, and loss of the main services for life. Since critical infrastructure depends on an interconnected “system of systems” any unattended device that cause threat may led to destroy bigger systems. Threats has great effect on both society and environment.
  • 10. 1 2 3 4 5 Loss life Loss confident Less productive Loss stability in economic Loss main services or halted for a period of time Threats impact on society On the society there are many impacts that must be considered.
  • 11. 1 2 3 4 5 Awareness to the cause of threats. Implement appropriate security measure. Notice any change and inform the responsible by any change. Use strong password for devices used. Follow the organization security instructions. Role of Society for Risk Analysis
  • 12.
  • 13. What Could Go Wrong? What if? Road Energy Sirens Water Telecom Transportation Dams
  • 14. Industry-Government Organizational Structure 16 Critical Infrastructure Sectors & Sector-Specific Agencies
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20. Figure 4.2: Main Players in the Smart Grid context
  • 21. Who and How • Who • Hacktivists • Insiders • Criminals • Terrorist • Nations • How • SQL injection • BotNet • Phishing • Social Media • Infected Websites
  • 22. Why is there concern? • Why - Attacks • Why - Cost • 2016 there was 1093 breaches • 36,601,939 records • 19,699,094 ssns • 7,472,540 credit cards • @$250 = $9,150,484,750 cost to organizations Cyber Investigations 15/Day Trojan Attempts 3000/Day SQL Injection 50/Day SPAM 100K/Day Web Activity 8.3M/Month
  • 24. • Motivations and attacks 2016 Cybersecurity Trends 24 • Denial of Service (DoS/DDoS): • Extortion, Fun, Punishment, Competition • Ransomware: • Extortion, some Punishment • Data Theft: • Sales, Espionage, Identity Theft, Fun, Embarrassment • Credential Theft: • Sales of credentials, credential reuse, password list aggregation • Botnets: DDoS, Bitcoin mining, Spam, illegal storage
  • 25. Layered Security What processes and assets need protection? What safeguards are available? What techniques can identify incidents? What techniques can contain impacts of incidents? What techniques can restore capabilities?
  • 26. Layered Security (Cont…) • Remediate – Critical Security Controls
  • 27. The Layered Approach Access Management PERIMETER APPLICATION NETWORK HOST DATA Encryption Access Control Input Validation Host IDs Vulnerability Assessment Access Control Host IDs Virus Protection Vulnerability Assessment Access Control Intrusion Detection Intrusion Prevention Vulnerability Assessment Access Control Firewall VPN Encryption Access Control LAYERED SECURITY FRAMEWORK Defense in Depth is an Information Assurance strategy utilized by Managed Security Services in which multiple layers of defense are placed throughout an Information Technology system. It addresses security vulnerabilities in personnel, technology and operations for the duration of the system's lifecycle.
  • 28. Critical Infrastructure Risk Management Framework The elements for the critical infrastructures are the physical, the cyber and the human. In order to protect the critical infrastructure we must do some steps: