SlideShare a Scribd company logo
The Biggest Cyber and Physical Security
Threats to Critical Infrastructure
Introduction: Critical infrastructure refers to the systems, facilities, and networks that are
essential to the functioning of a society and its economy. These are the assets that, if damaged or
disrupted, could have a significant impact on public health and safety, economic security, and
national security.
Examples of critical infrastructure include:
1. Energy systems (power plants, oil and gas refineries, pipelines)
2. Transportation systems (highways, bridges, airports, railways, ports)
3. Communication systems (telecommunications, internet, data centers)
4. Water and wastewater systems (dams, reservoirs, treatment plants)
5. Financial systems (banks, stock exchanges, payment systems)
6. Emergency services (police, fire, and ambulance services)
7. Healthcare systems (hospitals, clinics, medical supply chains)
Of the many cyber and physical security threats to critical infrastructure here are some key ones:
1. Malware and ransomware attacks: Malicious software can infiltrate a system and cause
damage or disruption to operations, and ransomware can encrypt files and demand payment in
exchange for the decryption key.
There have been several high-profile ransomware attacks on critical infrastructure in recent
years, including attacks on energy and water utilities, transportation systems, and healthcare
providers. Some recent statistics on ransomware attacks on critical infrastructure:
 In 2020, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) reported a
significant increase in ransomware attacks on industrial control systems (ICS) and critical
infrastructure. These attacks involved a range of sectors, including manufacturing,
energy, and transportation.
 According to a report by cybersecurity firm Dragos, there were at least five ransomware
attacks on operational technology (OT) networks in 2020, including attacks on energy
and manufacturing companies. Dragos also said in February 2023 that ICS/OT
ransomware attacks are up 87%.
 The 2021 Data Breach Investigations Report by Verizon found that ransomware was
involved in 10% of all data breaches in the public sector, which includes critical
infrastructure organizations.
 In May 2021, the Colonial Pipeline, which supplies fuel to much of the eastern United
States, was hit by a ransomware attack that caused a temporary shutdown of its
operations. This incident highlighted the vulnerability of critical infrastructure to cyber
attacks.
 According to a report by cybersecurity company CrowdStrike, the number of ransomware
attacks on critical infrastructure increased by 158% in the first half of 2021 compared to
the same period in 2020.
 According to the 2023 CrowdStrike Global Threat Report, eCrime actors moving beyond
ransom payments for monetization – 2022 saw a 20% increase in the number of
adversaries conducting data theft and extortion campaigns. China-nexus espionage surged
across all 39 global industry sectors and 20 geographic regions tracked by CrowdStrike
Intelligence – Rise in China-nexus adversary activity shows that organizations across the
world and in every vertical must be vigilant against the threat from Beijing.
2. Insider threats: Malicious insiders can use their access to cause damage or steal sensitive
information. Here are some famous examples of cybersecurity insider threats that have
succeeded in causing damage:
 Edward Snowden: In 2013, Snowden, a former contractor for the U.S. National Security
Agency (NSA), leaked classified documents to the media that revealed the extent of the
agency's surveillance activities. The leak caused widespread controversy and prompted
changes in how the U.S. government conducts surveillance.
 Harold Martin: In 2016, Martin, a former contractor for the NSA, was arrested for
stealing classified information from the agency. He was found to have taken terabytes of
data over a period of two decades, including highly sensitive information about U.S.
intelligence capabilities.
 Chelsea Manning: In 2010, Manning, a former U.S. Army soldier, leaked classified
documents to Wikileaks that included diplomatic cables, military reports, and other
sensitive information. Manning was convicted of espionage and other charges and
sentenced to 35 years in prison, although her sentence was later commuted by President
Barack Obama.
 Harold T. Martin III: In 2020, Martin, a former contractor for the National Security
Agency (NSA), was sentenced to nine years in prison for stealing classified information
from the agency. The stolen data included hacking tools and other sensitive information
that Martin had stored on his personal devices.
3. Physical attacks: Physical attacks on critical infrastructure, such as sabotage or destruction
of equipment, can also pose significant cybersecurity risks. Examples include:
 Sabotage: This involves intentionally damaging or destroying critical infrastructure
assets, such as by planting explosives near a key bridge or dam.
 Theft: This involves stealing critical infrastructure assets or materials, such as copper
wiring from a power substation or fuel from an oil refinery.
 Vandalism: This involves damaging or defacing critical infrastructure assets, such as by
graffiti or destruction of communication lines.
Physical attacks on critical infrastructure can have serious consequences, including loss of life,
environmental damage, and economic disruption. It's important for organizations responsible for
critical infrastructure to have physical security measures in place to prevent and respond to
physical attacks. These measures may include surveillance cameras, physical barriers, access
controls, and emergency response plans.
4. Social engineering: This involves manipulating people into divulging sensitive information
or taking actions that compromise security. Phishing is a primary example of such manipulation
and is still one of the most prevalent types of attack. According to the 2021 Data Breach
Investigations Report by Verizon, phishing was involved in 36% of all data breaches, making it
the top threat action in the report.
Phishing attacks are also becoming increasingly sophisticated and targeted, with attackers using
social engineering tactics to trick victims into divulging sensitive information or downloading
malware. This can include impersonating trusted individuals or organizations, creating
convincing fake websites or emails, and using urgent or threatening language to pressure victims
into taking action.
According to the 2021 State of the Phish Report by Proofpoint, 75% of organizations surveyed
reported being targeted by phishing attacks in 2020, and 59% of those attacks were successful in
compromising at least one user account or system. The report also found that COVID-19 related
phishing attacks were particularly prevalent in 2020, taking advantage of the pandemic to trick
victims into providing personal information or downloading malware.
5. Distributed denial of service (DDoS) attacks: These attacks flood a system with traffic,
overwhelming it and causing it to crash or become unavailable.
6. Advanced persistent threats (APTs): APTs are sophisticated, long-term attacks that target
specific organizations and can involve multiple stages of infiltration and exfiltration.
According to the 2023 CrowdStrike Global Threat Report, An uptick in social engineering tactics
targeting human interactions – Tactics such as vishing direct victims to download malware and
SIM swapping to circumvent multi-factor authentication (MFA).
Epilogue: If you have thoughts and ideas on how to improve security for critical infrastructure I
would love to hear them. In the meantime, here is a presentation on why power plants are
particularly vulnerable to cyber threats. https://www.youtube.com/watch?v=rCG-WaLGFQw

More Related Content

Similar to The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM May 2023.pdf

Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
David Sweigert
 
C018131821
C018131821C018131821
C018131821
IOSR Journals
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
Margarete McGrath
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standards
David Sweigert
 
Cyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsCyber Threat to Public Safety Communications
Cyber Threat to Public Safety Communications
Kory Edwards
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
alinainglis
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
Andrea Rossetti
 
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYTHE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
ijcsit
 
The Professionalization of the Hacker Industry
The Professionalization of the Hacker IndustryThe Professionalization of the Hacker Industry
The Professionalization of the Hacker Industry
AIRCC Publishing Corporation
 
Cyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsCyber Threat to Public Safety Communications
Cyber Threat to Public Safety Communications
Kory Edwards
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
Write My Paper One Day Mercy College
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for Cybersecurity
Spark Security
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
William McBorrough
 
Protect the Unexpected
Protect the UnexpectedProtect the Unexpected
Protect the Unexpected
Charles Mok
 
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryWhat Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
CR Group
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
ericbrooks84875
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
Spire Research and Consulting
 
Digital danger zone tackling cyber security
Digital danger zone tackling cyber securityDigital danger zone tackling cyber security
Digital danger zone tackling cyber security
John Kingsley
 
Digital danger zone tackling cyber security
Digital danger zone tackling cyber securityDigital danger zone tackling cyber security
Digital danger zone tackling cyber security
iFluidsEng
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docx
rtodd599
 

Similar to The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM May 2023.pdf (20)

Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
 
C018131821
C018131821C018131821
C018131821
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standards
 
Cyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsCyber Threat to Public Safety Communications
Cyber Threat to Public Safety Communications
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYTHE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
 
The Professionalization of the Hacker Industry
The Professionalization of the Hacker IndustryThe Professionalization of the Hacker Industry
The Professionalization of the Hacker Industry
 
Cyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsCyber Threat to Public Safety Communications
Cyber Threat to Public Safety Communications
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for Cybersecurity
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
Protect the Unexpected
Protect the UnexpectedProtect the Unexpected
Protect the Unexpected
 
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryWhat Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 
Digital danger zone tackling cyber security
Digital danger zone tackling cyber securityDigital danger zone tackling cyber security
Digital danger zone tackling cyber security
 
Digital danger zone tackling cyber security
Digital danger zone tackling cyber securityDigital danger zone tackling cyber security
Digital danger zone tackling cyber security
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docx
 

More from Fas (Feisal) Mosleh

Robotics for Power Plants with IBM and Certrec Webinar Presentation V6.pdf
Robotics for Power Plants with IBM and Certrec Webinar Presentation V6.pdfRobotics for Power Plants with IBM and Certrec Webinar Presentation V6.pdf
Robotics for Power Plants with IBM and Certrec Webinar Presentation V6.pdf
Fas (Feisal) Mosleh
 
WHITE PAPER - The Importance of CIP in the Energy Sector v2.0.pdf
WHITE PAPER - The Importance of CIP in the Energy Sector v2.0.pdfWHITE PAPER - The Importance of CIP in the Energy Sector v2.0.pdf
WHITE PAPER - The Importance of CIP in the Energy Sector v2.0.pdf
Fas (Feisal) Mosleh
 
Brief introduction to NoSQL by fas mosleh
Brief introduction to NoSQL by fas moslehBrief introduction to NoSQL by fas mosleh
Brief introduction to NoSQL by fas mosleh
Fas (Feisal) Mosleh
 
Introduction to virtual desktop infrastructure v3
Introduction to virtual desktop infrastructure  v3Introduction to virtual desktop infrastructure  v3
Introduction to virtual desktop infrastructure v3
Fas (Feisal) Mosleh
 
Joint gtm for software and systems technologies
Joint gtm for software and systems technologiesJoint gtm for software and systems technologies
Joint gtm for software and systems technologies
Fas (Feisal) Mosleh
 
Hq camera avago ee times article v2
Hq camera    avago ee times article v2Hq camera    avago ee times article v2
Hq camera avago ee times article v2
Fas (Feisal) Mosleh
 
Agilent technologies announces innovative image pipe for camera phones
Agilent technologies announces innovative image pipe for camera phonesAgilent technologies announces innovative image pipe for camera phones
Agilent technologies announces innovative image pipe for camera phones
Fas (Feisal) Mosleh
 
Migrating from ibm to hpe
Migrating from ibm to hpeMigrating from ibm to hpe
Migrating from ibm to hpe
Fas (Feisal) Mosleh
 
Mission critical linux white paper
Mission critical linux white paperMission critical linux white paper
Mission critical linux white paper
Fas (Feisal) Mosleh
 
Juldee IP and tech monetization v4 by ex-Hewlett-Packard Director of IP Fas M...
Juldee IP and tech monetization v4 by ex-Hewlett-Packard Director of IP Fas M...Juldee IP and tech monetization v4 by ex-Hewlett-Packard Director of IP Fas M...
Juldee IP and tech monetization v4 by ex-Hewlett-Packard Director of IP Fas M...
Fas (Feisal) Mosleh
 
Syndicated Patent Deals = Supercharging the buying and selling of patents by ...
Syndicated Patent Deals = Supercharging the buying and selling of patents by ...Syndicated Patent Deals = Supercharging the buying and selling of patents by ...
Syndicated Patent Deals = Supercharging the buying and selling of patents by ...
Fas (Feisal) Mosleh
 
Juldee Ventures - why si valley summary
Juldee Ventures  - why si valley summaryJuldee Ventures  - why si valley summary
Juldee Ventures - why si valley summary
Fas (Feisal) Mosleh
 
Introduction to IP and technology licensing for technology executives by Fas ...
Introduction to IP and technology licensing for technology executives by Fas ...Introduction to IP and technology licensing for technology executives by Fas ...
Introduction to IP and technology licensing for technology executives by Fas ...
Fas (Feisal) Mosleh
 
The value of patents the executives' perspective v3
The value of patents   the executives' perspective v3The value of patents   the executives' perspective v3
The value of patents the executives' perspective v3
Fas (Feisal) Mosleh
 
Innovation & disruption hp talk april 2010 juldee version
Innovation & disruption hp talk april 2010 juldee versionInnovation & disruption hp talk april 2010 juldee version
Innovation & disruption hp talk april 2010 juldee version
Fas (Feisal) Mosleh
 
Creative venturing creative funding v2 12 06-2013 for distribution
Creative venturing creative funding v2 12 06-2013 for distributionCreative venturing creative funding v2 12 06-2013 for distribution
Creative venturing creative funding v2 12 06-2013 for distribution
Fas (Feisal) Mosleh
 
Creative exits v3 10 20-2013 for distribution Fas Mosleh at OPEN Networking E...
Creative exits v3 10 20-2013 for distribution Fas Mosleh at OPEN Networking E...Creative exits v3 10 20-2013 for distribution Fas Mosleh at OPEN Networking E...
Creative exits v3 10 20-2013 for distribution Fas Mosleh at OPEN Networking E...
Fas (Feisal) Mosleh
 
Upping valuation v2 9 30-2013
Upping valuation v2 9 30-2013Upping valuation v2 9 30-2013
Upping valuation v2 9 30-2013
Fas (Feisal) Mosleh
 
Why Acquire Patents? kanzatec summary 2013
Why Acquire Patents?   kanzatec summary 2013Why Acquire Patents?   kanzatec summary 2013
Why Acquire Patents? kanzatec summary 2013
Fas (Feisal) Mosleh
 

More from Fas (Feisal) Mosleh (19)

Robotics for Power Plants with IBM and Certrec Webinar Presentation V6.pdf
Robotics for Power Plants with IBM and Certrec Webinar Presentation V6.pdfRobotics for Power Plants with IBM and Certrec Webinar Presentation V6.pdf
Robotics for Power Plants with IBM and Certrec Webinar Presentation V6.pdf
 
WHITE PAPER - The Importance of CIP in the Energy Sector v2.0.pdf
WHITE PAPER - The Importance of CIP in the Energy Sector v2.0.pdfWHITE PAPER - The Importance of CIP in the Energy Sector v2.0.pdf
WHITE PAPER - The Importance of CIP in the Energy Sector v2.0.pdf
 
Brief introduction to NoSQL by fas mosleh
Brief introduction to NoSQL by fas moslehBrief introduction to NoSQL by fas mosleh
Brief introduction to NoSQL by fas mosleh
 
Introduction to virtual desktop infrastructure v3
Introduction to virtual desktop infrastructure  v3Introduction to virtual desktop infrastructure  v3
Introduction to virtual desktop infrastructure v3
 
Joint gtm for software and systems technologies
Joint gtm for software and systems technologiesJoint gtm for software and systems technologies
Joint gtm for software and systems technologies
 
Hq camera avago ee times article v2
Hq camera    avago ee times article v2Hq camera    avago ee times article v2
Hq camera avago ee times article v2
 
Agilent technologies announces innovative image pipe for camera phones
Agilent technologies announces innovative image pipe for camera phonesAgilent technologies announces innovative image pipe for camera phones
Agilent technologies announces innovative image pipe for camera phones
 
Migrating from ibm to hpe
Migrating from ibm to hpeMigrating from ibm to hpe
Migrating from ibm to hpe
 
Mission critical linux white paper
Mission critical linux white paperMission critical linux white paper
Mission critical linux white paper
 
Juldee IP and tech monetization v4 by ex-Hewlett-Packard Director of IP Fas M...
Juldee IP and tech monetization v4 by ex-Hewlett-Packard Director of IP Fas M...Juldee IP and tech monetization v4 by ex-Hewlett-Packard Director of IP Fas M...
Juldee IP and tech monetization v4 by ex-Hewlett-Packard Director of IP Fas M...
 
Syndicated Patent Deals = Supercharging the buying and selling of patents by ...
Syndicated Patent Deals = Supercharging the buying and selling of patents by ...Syndicated Patent Deals = Supercharging the buying and selling of patents by ...
Syndicated Patent Deals = Supercharging the buying and selling of patents by ...
 
Juldee Ventures - why si valley summary
Juldee Ventures  - why si valley summaryJuldee Ventures  - why si valley summary
Juldee Ventures - why si valley summary
 
Introduction to IP and technology licensing for technology executives by Fas ...
Introduction to IP and technology licensing for technology executives by Fas ...Introduction to IP and technology licensing for technology executives by Fas ...
Introduction to IP and technology licensing for technology executives by Fas ...
 
The value of patents the executives' perspective v3
The value of patents   the executives' perspective v3The value of patents   the executives' perspective v3
The value of patents the executives' perspective v3
 
Innovation & disruption hp talk april 2010 juldee version
Innovation & disruption hp talk april 2010 juldee versionInnovation & disruption hp talk april 2010 juldee version
Innovation & disruption hp talk april 2010 juldee version
 
Creative venturing creative funding v2 12 06-2013 for distribution
Creative venturing creative funding v2 12 06-2013 for distributionCreative venturing creative funding v2 12 06-2013 for distribution
Creative venturing creative funding v2 12 06-2013 for distribution
 
Creative exits v3 10 20-2013 for distribution Fas Mosleh at OPEN Networking E...
Creative exits v3 10 20-2013 for distribution Fas Mosleh at OPEN Networking E...Creative exits v3 10 20-2013 for distribution Fas Mosleh at OPEN Networking E...
Creative exits v3 10 20-2013 for distribution Fas Mosleh at OPEN Networking E...
 
Upping valuation v2 9 30-2013
Upping valuation v2 9 30-2013Upping valuation v2 9 30-2013
Upping valuation v2 9 30-2013
 
Why Acquire Patents? kanzatec summary 2013
Why Acquire Patents?   kanzatec summary 2013Why Acquire Patents?   kanzatec summary 2013
Why Acquire Patents? kanzatec summary 2013
 

Recently uploaded

Strategic Org Design with Org Topologies™
Strategic Org Design with Org Topologies™Strategic Org Design with Org Topologies™
Strategic Org Design with Org Topologies™
Alexey Krivitsky
 
Impact of Effective Performance Appraisal Systems on Employee Motivation and ...
Impact of Effective Performance Appraisal Systems on Employee Motivation and ...Impact of Effective Performance Appraisal Systems on Employee Motivation and ...
Impact of Effective Performance Appraisal Systems on Employee Motivation and ...
Dr. Nazrul Islam
 
Ganpati Kumar Choudhary Indian Ethos PPT.pptx
Ganpati Kumar Choudhary Indian Ethos PPT.pptxGanpati Kumar Choudhary Indian Ethos PPT.pptx
Ganpati Kumar Choudhary Indian Ethos PPT.pptx
GanpatiKumarChoudhar
 
Myrna Story of Leadership and Management
Myrna Story of Leadership and ManagementMyrna Story of Leadership and Management
Myrna Story of Leadership and Management
Waleed Kamal
 
Chart--Time Management.pdf How to time is spent
Chart--Time Management.pdf How to time is spentChart--Time Management.pdf How to time is spent
Chart--Time Management.pdf How to time is spent
spandane
 
一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理
8p28uk6g
 
Team Building and TUCKMANS MODEL Explained
Team Building and TUCKMANS MODEL ExplainedTeam Building and TUCKMANS MODEL Explained
Team Building and TUCKMANS MODEL Explained
iampriyanshujaiswal
 
All the Small Things - XP2024 Bolzano/Bozen
All the Small Things - XP2024 Bolzano/BozenAll the Small Things - XP2024 Bolzano/Bozen
All the Small Things - XP2024 Bolzano/Bozen
Alberto Brandolini
 
Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...
Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...
Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...
Alexey Krivitsky
 
Enriching engagement with ethical review processes
Enriching engagement with ethical review processesEnriching engagement with ethical review processes
Enriching engagement with ethical review processes
strikingabalance
 
12 steps to transform your organization into the agile org you deserve
12 steps to transform your organization into the agile org you deserve12 steps to transform your organization into the agile org you deserve
12 steps to transform your organization into the agile org you deserve
Pierre E. NEIS
 
innovation in nursing practice, education and management.pptx
innovation in nursing practice, education and management.pptxinnovation in nursing practice, education and management.pptx
innovation in nursing practice, education and management.pptx
TulsiDhidhi1
 
Comparing Stability and Sustainability in Agile Systems
Comparing Stability and Sustainability in Agile SystemsComparing Stability and Sustainability in Agile Systems
Comparing Stability and Sustainability in Agile Systems
Rob Healy
 
20240608 QFM019 Engineering Leadership Reading List May 2024
20240608 QFM019 Engineering Leadership Reading List May 202420240608 QFM019 Engineering Leadership Reading List May 2024
20240608 QFM019 Engineering Leadership Reading List May 2024
Matthew Sinclair
 
The Management Guide: From Projects to Portfolio
The Management Guide: From Projects to PortfolioThe Management Guide: From Projects to Portfolio
The Management Guide: From Projects to Portfolio
Ahmed AbdelMoneim
 
Stuart Wilson the teams I have led - 2024
Stuart Wilson the teams I have led - 2024Stuart Wilson the teams I have led - 2024
Stuart Wilson the teams I have led - 2024
stuwilson.co.uk
 
Addiction to Winning Across Diverse Populations.pdf
Addiction to Winning Across Diverse Populations.pdfAddiction to Winning Across Diverse Populations.pdf
Addiction to Winning Across Diverse Populations.pdf
Bill641377
 
Sethurathnam Ravi: A Legacy in Finance and Leadership
Sethurathnam Ravi: A Legacy in Finance and LeadershipSethurathnam Ravi: A Legacy in Finance and Leadership
Sethurathnam Ravi: A Legacy in Finance and Leadership
Anjana Josie
 
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
dsnow9802
 
Conflict resololution,role of hr in resolution
Conflict resololution,role of hr in resolutionConflict resololution,role of hr in resolution
Conflict resololution,role of hr in resolution
Dr. Christine Ngari ,Ph.D (HRM)
 

Recently uploaded (20)

Strategic Org Design with Org Topologies™
Strategic Org Design with Org Topologies™Strategic Org Design with Org Topologies™
Strategic Org Design with Org Topologies™
 
Impact of Effective Performance Appraisal Systems on Employee Motivation and ...
Impact of Effective Performance Appraisal Systems on Employee Motivation and ...Impact of Effective Performance Appraisal Systems on Employee Motivation and ...
Impact of Effective Performance Appraisal Systems on Employee Motivation and ...
 
Ganpati Kumar Choudhary Indian Ethos PPT.pptx
Ganpati Kumar Choudhary Indian Ethos PPT.pptxGanpati Kumar Choudhary Indian Ethos PPT.pptx
Ganpati Kumar Choudhary Indian Ethos PPT.pptx
 
Myrna Story of Leadership and Management
Myrna Story of Leadership and ManagementMyrna Story of Leadership and Management
Myrna Story of Leadership and Management
 
Chart--Time Management.pdf How to time is spent
Chart--Time Management.pdf How to time is spentChart--Time Management.pdf How to time is spent
Chart--Time Management.pdf How to time is spent
 
一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理
 
Team Building and TUCKMANS MODEL Explained
Team Building and TUCKMANS MODEL ExplainedTeam Building and TUCKMANS MODEL Explained
Team Building and TUCKMANS MODEL Explained
 
All the Small Things - XP2024 Bolzano/Bozen
All the Small Things - XP2024 Bolzano/BozenAll the Small Things - XP2024 Bolzano/Bozen
All the Small Things - XP2024 Bolzano/Bozen
 
Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...
Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...
Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...
 
Enriching engagement with ethical review processes
Enriching engagement with ethical review processesEnriching engagement with ethical review processes
Enriching engagement with ethical review processes
 
12 steps to transform your organization into the agile org you deserve
12 steps to transform your organization into the agile org you deserve12 steps to transform your organization into the agile org you deserve
12 steps to transform your organization into the agile org you deserve
 
innovation in nursing practice, education and management.pptx
innovation in nursing practice, education and management.pptxinnovation in nursing practice, education and management.pptx
innovation in nursing practice, education and management.pptx
 
Comparing Stability and Sustainability in Agile Systems
Comparing Stability and Sustainability in Agile SystemsComparing Stability and Sustainability in Agile Systems
Comparing Stability and Sustainability in Agile Systems
 
20240608 QFM019 Engineering Leadership Reading List May 2024
20240608 QFM019 Engineering Leadership Reading List May 202420240608 QFM019 Engineering Leadership Reading List May 2024
20240608 QFM019 Engineering Leadership Reading List May 2024
 
The Management Guide: From Projects to Portfolio
The Management Guide: From Projects to PortfolioThe Management Guide: From Projects to Portfolio
The Management Guide: From Projects to Portfolio
 
Stuart Wilson the teams I have led - 2024
Stuart Wilson the teams I have led - 2024Stuart Wilson the teams I have led - 2024
Stuart Wilson the teams I have led - 2024
 
Addiction to Winning Across Diverse Populations.pdf
Addiction to Winning Across Diverse Populations.pdfAddiction to Winning Across Diverse Populations.pdf
Addiction to Winning Across Diverse Populations.pdf
 
Sethurathnam Ravi: A Legacy in Finance and Leadership
Sethurathnam Ravi: A Legacy in Finance and LeadershipSethurathnam Ravi: A Legacy in Finance and Leadership
Sethurathnam Ravi: A Legacy in Finance and Leadership
 
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
 
Conflict resololution,role of hr in resolution
Conflict resololution,role of hr in resolutionConflict resololution,role of hr in resolution
Conflict resololution,role of hr in resolution
 

The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM May 2023.pdf

  • 1. The Biggest Cyber and Physical Security Threats to Critical Infrastructure Introduction: Critical infrastructure refers to the systems, facilities, and networks that are essential to the functioning of a society and its economy. These are the assets that, if damaged or disrupted, could have a significant impact on public health and safety, economic security, and national security. Examples of critical infrastructure include: 1. Energy systems (power plants, oil and gas refineries, pipelines) 2. Transportation systems (highways, bridges, airports, railways, ports) 3. Communication systems (telecommunications, internet, data centers) 4. Water and wastewater systems (dams, reservoirs, treatment plants) 5. Financial systems (banks, stock exchanges, payment systems) 6. Emergency services (police, fire, and ambulance services) 7. Healthcare systems (hospitals, clinics, medical supply chains)
  • 2. Of the many cyber and physical security threats to critical infrastructure here are some key ones: 1. Malware and ransomware attacks: Malicious software can infiltrate a system and cause damage or disruption to operations, and ransomware can encrypt files and demand payment in exchange for the decryption key. There have been several high-profile ransomware attacks on critical infrastructure in recent years, including attacks on energy and water utilities, transportation systems, and healthcare providers. Some recent statistics on ransomware attacks on critical infrastructure:  In 2020, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) reported a significant increase in ransomware attacks on industrial control systems (ICS) and critical infrastructure. These attacks involved a range of sectors, including manufacturing, energy, and transportation.  According to a report by cybersecurity firm Dragos, there were at least five ransomware attacks on operational technology (OT) networks in 2020, including attacks on energy and manufacturing companies. Dragos also said in February 2023 that ICS/OT ransomware attacks are up 87%.  The 2021 Data Breach Investigations Report by Verizon found that ransomware was involved in 10% of all data breaches in the public sector, which includes critical infrastructure organizations.  In May 2021, the Colonial Pipeline, which supplies fuel to much of the eastern United States, was hit by a ransomware attack that caused a temporary shutdown of its operations. This incident highlighted the vulnerability of critical infrastructure to cyber attacks.  According to a report by cybersecurity company CrowdStrike, the number of ransomware attacks on critical infrastructure increased by 158% in the first half of 2021 compared to the same period in 2020.  According to the 2023 CrowdStrike Global Threat Report, eCrime actors moving beyond ransom payments for monetization – 2022 saw a 20% increase in the number of adversaries conducting data theft and extortion campaigns. China-nexus espionage surged across all 39 global industry sectors and 20 geographic regions tracked by CrowdStrike Intelligence – Rise in China-nexus adversary activity shows that organizations across the world and in every vertical must be vigilant against the threat from Beijing.
  • 3. 2. Insider threats: Malicious insiders can use their access to cause damage or steal sensitive information. Here are some famous examples of cybersecurity insider threats that have succeeded in causing damage:  Edward Snowden: In 2013, Snowden, a former contractor for the U.S. National Security Agency (NSA), leaked classified documents to the media that revealed the extent of the agency's surveillance activities. The leak caused widespread controversy and prompted changes in how the U.S. government conducts surveillance.  Harold Martin: In 2016, Martin, a former contractor for the NSA, was arrested for stealing classified information from the agency. He was found to have taken terabytes of data over a period of two decades, including highly sensitive information about U.S. intelligence capabilities.  Chelsea Manning: In 2010, Manning, a former U.S. Army soldier, leaked classified documents to Wikileaks that included diplomatic cables, military reports, and other sensitive information. Manning was convicted of espionage and other charges and sentenced to 35 years in prison, although her sentence was later commuted by President Barack Obama.  Harold T. Martin III: In 2020, Martin, a former contractor for the National Security Agency (NSA), was sentenced to nine years in prison for stealing classified information from the agency. The stolen data included hacking tools and other sensitive information that Martin had stored on his personal devices. 3. Physical attacks: Physical attacks on critical infrastructure, such as sabotage or destruction of equipment, can also pose significant cybersecurity risks. Examples include:  Sabotage: This involves intentionally damaging or destroying critical infrastructure assets, such as by planting explosives near a key bridge or dam.  Theft: This involves stealing critical infrastructure assets or materials, such as copper wiring from a power substation or fuel from an oil refinery.  Vandalism: This involves damaging or defacing critical infrastructure assets, such as by graffiti or destruction of communication lines. Physical attacks on critical infrastructure can have serious consequences, including loss of life, environmental damage, and economic disruption. It's important for organizations responsible for critical infrastructure to have physical security measures in place to prevent and respond to physical attacks. These measures may include surveillance cameras, physical barriers, access controls, and emergency response plans.
  • 4. 4. Social engineering: This involves manipulating people into divulging sensitive information or taking actions that compromise security. Phishing is a primary example of such manipulation and is still one of the most prevalent types of attack. According to the 2021 Data Breach Investigations Report by Verizon, phishing was involved in 36% of all data breaches, making it the top threat action in the report. Phishing attacks are also becoming increasingly sophisticated and targeted, with attackers using social engineering tactics to trick victims into divulging sensitive information or downloading malware. This can include impersonating trusted individuals or organizations, creating convincing fake websites or emails, and using urgent or threatening language to pressure victims into taking action. According to the 2021 State of the Phish Report by Proofpoint, 75% of organizations surveyed reported being targeted by phishing attacks in 2020, and 59% of those attacks were successful in compromising at least one user account or system. The report also found that COVID-19 related phishing attacks were particularly prevalent in 2020, taking advantage of the pandemic to trick victims into providing personal information or downloading malware. 5. Distributed denial of service (DDoS) attacks: These attacks flood a system with traffic, overwhelming it and causing it to crash or become unavailable. 6. Advanced persistent threats (APTs): APTs are sophisticated, long-term attacks that target specific organizations and can involve multiple stages of infiltration and exfiltration. According to the 2023 CrowdStrike Global Threat Report, An uptick in social engineering tactics targeting human interactions – Tactics such as vishing direct victims to download malware and SIM swapping to circumvent multi-factor authentication (MFA). Epilogue: If you have thoughts and ideas on how to improve security for critical infrastructure I would love to hear them. In the meantime, here is a presentation on why power plants are particularly vulnerable to cyber threats. https://www.youtube.com/watch?v=rCG-WaLGFQw