SlideShare a Scribd company logo
1 of 21
Download to read offline
Cyber Attacks on Critical
Critical Infrastructure
The number of cyber attacks on critical infrastructure has been increasing,
posing a significant threat to national security and public safety. These
attacks target systems such as power grids, water supplies, and
transportation networks with the potential to cause widespread disruption
and chaos.
by Varsha Sewlal
Definition of Critical Infrastructure:
Critical infrastructure refers to the systems and assets
that are essential for the functioning of a society and economy.
These systems are so vital that their disruption or destruction
would have a debilitating effect on national security, economic stability,
public health, or safety.
Power
Includes power plants, substations,
and electricity distribution
networks.
Communication
Encompasses
telecommunications, internet
services, and data centers.
Transportation
Covers airports, highways, railways, and public transportation systems.
Examples of Cyber Attacks
1 Ransomware Attacks
Ransomware attacks have targeted
critical infrastructure, demanding
large sums of money for the release
of crucial systems.
2 Phishing and Malware
Phishing scams and malware have
been used to infiltrate and
compromise the security of critical
infrastructure systems.
3 Distributed Denial of Service (DDoS)
DDoS attacks have overwhelmed infrastructure systems, causing widespread outages
and disruptions.
Examples of Cyber Attacks on Critical
Infrastructure
1 Hacking Power Grids
Attempted infiltrations of power grids
aiming to cause widespread outages and
chaos.
2 Compromising Water Supply
Instances of hackers attempting to
contaminate water supply systems with
dangerous substances.
3 Disrupting Transportation Systems
Incidents where transportation networks
have been targeted for disruption and
safety hazards.
4 Manipulating Communication
Networks
Examples of cyber attacks aimed at
disrupting communication and information
exchange systems of critical
infrastructure.
Vulnerabilities in CI Systems arise due to :
to :
Outdated Systems
Many critical infrastructure systems are running on outdated software and
legacy technology, making them susceptible to cyber attacks.
Interconnected Networks
The interconnected nature of critical infrastructure systems poses a significant
risk, as a breach in one system can affect others.
Vulnerabilities in Critical Infrastructure
Security Systems
Security systems, are
vulnerable to cyber attacks
due to :
poor access control, weak
passwords, and inadequate
security configurations.
•Lack of encryption for
sensitive data leaves it
vulnerable to interception
during transmission or
storage.
Supply Chain Risks
Vulnerabilities in supply chain
software can leave critical
infrastructure systems
exposed. Attacks targeting
software vendors or providers
can introduce malware or
backdoors into systems
unknowingly.
Human Error
Instances of human error and
oversight can lead to security
vulnerabilities in critical
infrastructure.
Consequences of Cyber Attacks on
Critical Infrastructure
1 Asset Damage
Cyber attacks can lead to physical damage of critical infrastructure assets,
causing substantial financial loss.
2 Service Disruption
Disruptions to essential services can impact communities and lead to major
safety concerns.
3 Economic Impact
Cyber attacks often result in economic losses for companies and the
government, affecting the overall economy.
Specific Cyber Attacks on Critical
Infrastructure in South Africa
2019 Johannesburg Power Outage
Outage
A cyber attack disrupted the power supply
in Johannesburg, leading to a major outage
affecting thousands of residents.
Water Treatment Plant Incident
A water treatment facility experienced a cyber attack, raising
concerns about the safety of the water supply.
Cyber Attack on Transnet July ,2021 In
A cyber-attack against Transnet, which operates major South
African ports and most of its railway networks, disrupted
container operations at the ports of Cape Town and Durban
Global Cyber Attacks on Critical
Infrastructure
2017 Attack on Maersk
A cyber attack was perpetrated against
shipping giant Maersk disabling their
networks globally.
2021/2022 Russian attacks on Ukrainian Energy Companies
Power stations were targeted by Russian
missile and drone strikes, while cyber
attacks were levied on state energy
companies .
Cybersecurity Measures to Mitigate
Mitigate risks of cyber attacks
1 Firewalls & Encryption
Organisations must implement robust firewalls and encryption protocols to
secure critical infrastructure.
2 Continuous Monitoring
Real-time monitoring and threat detection systems are being utilised to
identify and respond to potential cyber threats. Regularly patch and update
software and firmware on all systems to address known vulnerabilities.
3 Employee Training
Training programs aim to enhance employee awareness and knowledge
related to cybersecurity best practices.
Cybersecurity Measures that mitigate
risks of cyber attacks
4 Threat Modelling
•Develop and maintain robust cyber threat intelligence capabilities to stay
informed about the latest attack methods and actors. This includes sharing
information with relevant entities like government agencies and private
sector partners. Conduct regular threat modeling to identify vulnerabilities in
critical infrastructure systems.
5 Segment Critical Infrastructure Networks
To limit the potential damage from a cyber attack.
6 Regulations & Standards
Implement and enforce regulations and standards that require critical
infrastructure owners and operators to take appropriate security measures.
Additional Mechanisms to Safeguard
Critical Infrastructure
Creating a
Cybersecurity Taskforce
A successful defence against a
cyber attack through swift and
coordinated action by a
cybersecurity taskforce.
Resilient Infrastructure
Case studies showcasing
critical infrastructure that
successfully withstood cyber
attacks due to robust security
measures.
Integrated Defence
Systems
Examples of integrated
defence systems that
effectively guarded critical
infrastructure against cyber
threats.
Role of Government and Regulations in
Safeguarding Critical Infrastructure
Regulatory Compliance
Government regulations play a crucial role in ensuring that critical infrastructure meets
security standards.
Collaborative Initiatives
Collaboration between government agencies, industry stakeholders, and cybersecurity
experts can enhance protection measures.
Investment in Research
Government investment in cybersecurity research and development contributes to
innovative protection strategies.
South African Regulations that
Safeguard Critical Infrastructure
CRITICAL INFRASTRUCTURE PROTECTION ACT 2019
Protects infrastructure essential for the economy, public safety, and basic
services. Makes it an offence to hinder security measures, trespass,
damage critical infrastructure, or threaten its security.
CRITICAL INFRASTRUCTURE PROTECTION REGULATIONS 2023
Establishes the Critical Infrastructure Council, Enables the creation of a security policy
and plan, designates inspectors and security personnel.
CYBERCRIMES ACT, 2020
Address cybercrime offences (illegal access, cyber extortion, etc.);grants
investigation powers to authorities, criminalise spreading harmful digital messages
& imposes penalties for violations (fines, imprisonment, or both), Establishing a
wider legal framework to pursue cybercriminals and improve response to online
threats. It DOES NOT however have a cybersecurity element to it.
Future Challenges
IoT Integration
The integration of Internet of Things (IoT) devices in critical infrastructure raises concerns
about additional vulnerabilities and attack surfaces.
Advanced Persistent Threats
The emergence of sophisticated and persistent cyber threats presents a continuous challenge
to safeguarding critical infrastructure systems.
Convergence of IT and Operational Technology (OT)
The increasing integration of information technology (IT) with operational technology (OT)
systems in critical infrastructure creates new vulnerabilities.
•Climate Change; Supply Chain Vulnerabilities; Geopolitical Tensions and Skilled Workforce
Shortages
Costs and Long -Term Effects on the
Economy
1 Financial Losses
Lost revenue, asset damage, and
increased operational costs.
2 Crisis Management
Expenses related to emergency
response, communication, and
customer support.
Long-term Effects on the Economy
4 Market Volatility
Unpredictable market behavior due to cyber-induced uncertainties.
5 Business Confidence
Decline in investor and consumer confidence, affecting economic
growth.
6 Policy Changes
Adjustments in regulations and government expenditure to
enhance cybersecurity.
Strategies to Mitigate Economic Impact
Cyber Resilience
Building robust systems to
withstand cyber disruptions
and rapidly recover.
Risk Management
Identifying vulnerabilities
and implementing proactive
risk mitigation measures.
Collaborative Approach
Fostering cooperation
between government,
industry, and security
agencies.
Conclusion and Key Takeaways
Prevention Early detection and deterrence
Resilience Quick recovery and continuity of operations
Collaboration Mutual support and information sharing
Conclusion and Key Takeaways
Security Measures
The importance of
implementing robust
security measures to
protect critical
infrastructure.
Government
Collaboration
The role of
collaborative efforts
between government
entities and industry
stakeholders in
safeguarding critical
infrastructure.
Resilient Systems
The significance of
building resilient
systems to withstand
cyber attacks and
ensure continued
functionality.
Cybersecurity
Training
The value of
comprehensive
cybersecurity training
programs for
personnel to enhance
security awareness.
Conclusion and Recommendations
Invest in Advanced Cyber Defense Enhance Information Sharing
Ensure Regulatory Compliance Establish Rapid Response Protocols

More Related Content

Similar to Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure

Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...cyberprosocial
 
Safeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdfSafeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdfjasonuchiha2
 
Meeting04_Threats_to_Critical_Infrastructure.pptx
Meeting04_Threats_to_Critical_Infrastructure.pptxMeeting04_Threats_to_Critical_Infrastructure.pptx
Meeting04_Threats_to_Critical_Infrastructure.pptxothmanomar13
 
Threat horizon 2017 by isf forum
Threat horizon 2017 by isf forumThreat horizon 2017 by isf forum
Threat horizon 2017 by isf forumfloora_jj
 
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxSECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxbagotjesusa
 
REPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptxREPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptxeresavenzon
 
Robots in The Chemical Industry
Robots in The Chemical IndustryRobots in The Chemical Industry
Robots in The Chemical IndustryIJRTEMJOURNAL
 
Cybersecurity for Chemical Industry
Cybersecurity for Chemical IndustryCybersecurity for Chemical Industry
Cybersecurity for Chemical Industryjournal ijrtem
 
How to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfHow to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfonline Marketing
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookMargarete McGrath
 
7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptxIT Company Dubai
 
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryWhat Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryCR Group
 
cyber security guidelines.pdf
cyber security guidelines.pdfcyber security guidelines.pdf
cyber security guidelines.pdfVarinSingh1
 
Power Plants Security Webinar Presentation
Power Plants Security Webinar PresentationPower Plants Security Webinar Presentation
Power Plants Security Webinar PresentationCertrec
 
Get Started with Cyber Security and Its Landscape Null Community Presentation...
Get Started with Cyber Security and Its Landscape Null Community Presentation...Get Started with Cyber Security and Its Landscape Null Community Presentation...
Get Started with Cyber Security and Its Landscape Null Community Presentation...null - The Open Security Community
 
Cyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxCyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxSharifulShishir
 
Cyber resilient infrastructure infographic
Cyber resilient infrastructure infographicCyber resilient infrastructure infographic
Cyber resilient infrastructure infographicAtkins
 
Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?
Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi? Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?
Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi? CypSec - Siber Güvenlik Konferansı
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistMatthew Rosenquist
 

Similar to Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure (20)

Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
 
Safeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdfSafeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdf
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
Meeting04_Threats_to_Critical_Infrastructure.pptx
Meeting04_Threats_to_Critical_Infrastructure.pptxMeeting04_Threats_to_Critical_Infrastructure.pptx
Meeting04_Threats_to_Critical_Infrastructure.pptx
 
Threat horizon 2017 by isf forum
Threat horizon 2017 by isf forumThreat horizon 2017 by isf forum
Threat horizon 2017 by isf forum
 
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxSECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
 
REPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptxREPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptx
 
Robots in The Chemical Industry
Robots in The Chemical IndustryRobots in The Chemical Industry
Robots in The Chemical Industry
 
Cybersecurity for Chemical Industry
Cybersecurity for Chemical IndustryCybersecurity for Chemical Industry
Cybersecurity for Chemical Industry
 
How to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfHow to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdf
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
 
7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx
 
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryWhat Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
 
cyber security guidelines.pdf
cyber security guidelines.pdfcyber security guidelines.pdf
cyber security guidelines.pdf
 
Power Plants Security Webinar Presentation
Power Plants Security Webinar PresentationPower Plants Security Webinar Presentation
Power Plants Security Webinar Presentation
 
Get Started with Cyber Security and Its Landscape Null Community Presentation...
Get Started with Cyber Security and Its Landscape Null Community Presentation...Get Started with Cyber Security and Its Landscape Null Community Presentation...
Get Started with Cyber Security and Its Landscape Null Community Presentation...
 
Cyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxCyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptx
 
Cyber resilient infrastructure infographic
Cyber resilient infrastructure infographicCyber resilient infrastructure infographic
Cyber resilient infrastructure infographic
 
Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?
Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi? Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?
Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
 

More from itnewsafrica

Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...itnewsafrica
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...itnewsafrica
 
Koen den Hollander- The Future is Omni
Koen den Hollander- The Future is OmniKoen den Hollander- The Future is Omni
Koen den Hollander- The Future is Omniitnewsafrica
 
Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023itnewsafrica
 
Emphasising Personalization and Customer Journey Mapping in Digital Retail
Emphasising Personalization and  Customer Journey Mapping in Digital  RetailEmphasising Personalization and  Customer Journey Mapping in Digital  Retail
Emphasising Personalization and Customer Journey Mapping in Digital Retailitnewsafrica
 
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...itnewsafrica
 
Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...itnewsafrica
 
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...itnewsafrica
 
Pravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in HealthcarePravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in Healthcareitnewsafrica
 
Braden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African HealthcareBraden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African Healthcareitnewsafrica
 
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...itnewsafrica
 
Anish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination PlatformAnish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination Platformitnewsafrica
 
Andrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the BetterAndrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the Betteritnewsafrica
 
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...itnewsafrica
 
Tanya Muller- Improving Healthcare Delivery Through The Use Of AI
Tanya Muller- Improving Healthcare Delivery Through The Use Of AITanya Muller- Improving Healthcare Delivery Through The Use Of AI
Tanya Muller- Improving Healthcare Delivery Through The Use Of AIitnewsafrica
 

More from itnewsafrica (20)

Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
 
Koen den Hollander- The Future is Omni
Koen den Hollander- The Future is OmniKoen den Hollander- The Future is Omni
Koen den Hollander- The Future is Omni
 
Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023
 
Emphasising Personalization and Customer Journey Mapping in Digital Retail
Emphasising Personalization and  Customer Journey Mapping in Digital  RetailEmphasising Personalization and  Customer Journey Mapping in Digital  Retail
Emphasising Personalization and Customer Journey Mapping in Digital Retail
 
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
 
Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...
 
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...
 
Pravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in HealthcarePravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in Healthcare
 
Braden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African HealthcareBraden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African Healthcare
 
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
 
Anish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination PlatformAnish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination Platform
 
Andrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the BetterAndrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the Better
 
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
 
Tanya Muller- Improving Healthcare Delivery Through The Use Of AI
Tanya Muller- Improving Healthcare Delivery Through The Use Of AITanya Muller- Improving Healthcare Delivery Through The Use Of AI
Tanya Muller- Improving Healthcare Delivery Through The Use Of AI
 

Recently uploaded

How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 

Recently uploaded (20)

How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 

Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure

  • 1. Cyber Attacks on Critical Critical Infrastructure The number of cyber attacks on critical infrastructure has been increasing, posing a significant threat to national security and public safety. These attacks target systems such as power grids, water supplies, and transportation networks with the potential to cause widespread disruption and chaos. by Varsha Sewlal
  • 2. Definition of Critical Infrastructure: Critical infrastructure refers to the systems and assets that are essential for the functioning of a society and economy. These systems are so vital that their disruption or destruction would have a debilitating effect on national security, economic stability, public health, or safety. Power Includes power plants, substations, and electricity distribution networks. Communication Encompasses telecommunications, internet services, and data centers. Transportation Covers airports, highways, railways, and public transportation systems.
  • 3. Examples of Cyber Attacks 1 Ransomware Attacks Ransomware attacks have targeted critical infrastructure, demanding large sums of money for the release of crucial systems. 2 Phishing and Malware Phishing scams and malware have been used to infiltrate and compromise the security of critical infrastructure systems. 3 Distributed Denial of Service (DDoS) DDoS attacks have overwhelmed infrastructure systems, causing widespread outages and disruptions.
  • 4. Examples of Cyber Attacks on Critical Infrastructure 1 Hacking Power Grids Attempted infiltrations of power grids aiming to cause widespread outages and chaos. 2 Compromising Water Supply Instances of hackers attempting to contaminate water supply systems with dangerous substances. 3 Disrupting Transportation Systems Incidents where transportation networks have been targeted for disruption and safety hazards. 4 Manipulating Communication Networks Examples of cyber attacks aimed at disrupting communication and information exchange systems of critical infrastructure.
  • 5. Vulnerabilities in CI Systems arise due to : to : Outdated Systems Many critical infrastructure systems are running on outdated software and legacy technology, making them susceptible to cyber attacks. Interconnected Networks The interconnected nature of critical infrastructure systems poses a significant risk, as a breach in one system can affect others.
  • 6. Vulnerabilities in Critical Infrastructure Security Systems Security systems, are vulnerable to cyber attacks due to : poor access control, weak passwords, and inadequate security configurations. •Lack of encryption for sensitive data leaves it vulnerable to interception during transmission or storage. Supply Chain Risks Vulnerabilities in supply chain software can leave critical infrastructure systems exposed. Attacks targeting software vendors or providers can introduce malware or backdoors into systems unknowingly. Human Error Instances of human error and oversight can lead to security vulnerabilities in critical infrastructure.
  • 7. Consequences of Cyber Attacks on Critical Infrastructure 1 Asset Damage Cyber attacks can lead to physical damage of critical infrastructure assets, causing substantial financial loss. 2 Service Disruption Disruptions to essential services can impact communities and lead to major safety concerns. 3 Economic Impact Cyber attacks often result in economic losses for companies and the government, affecting the overall economy.
  • 8. Specific Cyber Attacks on Critical Infrastructure in South Africa 2019 Johannesburg Power Outage Outage A cyber attack disrupted the power supply in Johannesburg, leading to a major outage affecting thousands of residents. Water Treatment Plant Incident A water treatment facility experienced a cyber attack, raising concerns about the safety of the water supply. Cyber Attack on Transnet July ,2021 In A cyber-attack against Transnet, which operates major South African ports and most of its railway networks, disrupted container operations at the ports of Cape Town and Durban
  • 9. Global Cyber Attacks on Critical Infrastructure 2017 Attack on Maersk A cyber attack was perpetrated against shipping giant Maersk disabling their networks globally. 2021/2022 Russian attacks on Ukrainian Energy Companies Power stations were targeted by Russian missile and drone strikes, while cyber attacks were levied on state energy companies .
  • 10. Cybersecurity Measures to Mitigate Mitigate risks of cyber attacks 1 Firewalls & Encryption Organisations must implement robust firewalls and encryption protocols to secure critical infrastructure. 2 Continuous Monitoring Real-time monitoring and threat detection systems are being utilised to identify and respond to potential cyber threats. Regularly patch and update software and firmware on all systems to address known vulnerabilities. 3 Employee Training Training programs aim to enhance employee awareness and knowledge related to cybersecurity best practices.
  • 11. Cybersecurity Measures that mitigate risks of cyber attacks 4 Threat Modelling •Develop and maintain robust cyber threat intelligence capabilities to stay informed about the latest attack methods and actors. This includes sharing information with relevant entities like government agencies and private sector partners. Conduct regular threat modeling to identify vulnerabilities in critical infrastructure systems. 5 Segment Critical Infrastructure Networks To limit the potential damage from a cyber attack. 6 Regulations & Standards Implement and enforce regulations and standards that require critical infrastructure owners and operators to take appropriate security measures.
  • 12. Additional Mechanisms to Safeguard Critical Infrastructure Creating a Cybersecurity Taskforce A successful defence against a cyber attack through swift and coordinated action by a cybersecurity taskforce. Resilient Infrastructure Case studies showcasing critical infrastructure that successfully withstood cyber attacks due to robust security measures. Integrated Defence Systems Examples of integrated defence systems that effectively guarded critical infrastructure against cyber threats.
  • 13. Role of Government and Regulations in Safeguarding Critical Infrastructure Regulatory Compliance Government regulations play a crucial role in ensuring that critical infrastructure meets security standards. Collaborative Initiatives Collaboration between government agencies, industry stakeholders, and cybersecurity experts can enhance protection measures. Investment in Research Government investment in cybersecurity research and development contributes to innovative protection strategies.
  • 14. South African Regulations that Safeguard Critical Infrastructure CRITICAL INFRASTRUCTURE PROTECTION ACT 2019 Protects infrastructure essential for the economy, public safety, and basic services. Makes it an offence to hinder security measures, trespass, damage critical infrastructure, or threaten its security. CRITICAL INFRASTRUCTURE PROTECTION REGULATIONS 2023 Establishes the Critical Infrastructure Council, Enables the creation of a security policy and plan, designates inspectors and security personnel. CYBERCRIMES ACT, 2020 Address cybercrime offences (illegal access, cyber extortion, etc.);grants investigation powers to authorities, criminalise spreading harmful digital messages & imposes penalties for violations (fines, imprisonment, or both), Establishing a wider legal framework to pursue cybercriminals and improve response to online threats. It DOES NOT however have a cybersecurity element to it.
  • 15. Future Challenges IoT Integration The integration of Internet of Things (IoT) devices in critical infrastructure raises concerns about additional vulnerabilities and attack surfaces. Advanced Persistent Threats The emergence of sophisticated and persistent cyber threats presents a continuous challenge to safeguarding critical infrastructure systems. Convergence of IT and Operational Technology (OT) The increasing integration of information technology (IT) with operational technology (OT) systems in critical infrastructure creates new vulnerabilities. •Climate Change; Supply Chain Vulnerabilities; Geopolitical Tensions and Skilled Workforce Shortages
  • 16. Costs and Long -Term Effects on the Economy 1 Financial Losses Lost revenue, asset damage, and increased operational costs. 2 Crisis Management Expenses related to emergency response, communication, and customer support.
  • 17. Long-term Effects on the Economy 4 Market Volatility Unpredictable market behavior due to cyber-induced uncertainties. 5 Business Confidence Decline in investor and consumer confidence, affecting economic growth. 6 Policy Changes Adjustments in regulations and government expenditure to enhance cybersecurity.
  • 18. Strategies to Mitigate Economic Impact Cyber Resilience Building robust systems to withstand cyber disruptions and rapidly recover. Risk Management Identifying vulnerabilities and implementing proactive risk mitigation measures. Collaborative Approach Fostering cooperation between government, industry, and security agencies.
  • 19. Conclusion and Key Takeaways Prevention Early detection and deterrence Resilience Quick recovery and continuity of operations Collaboration Mutual support and information sharing
  • 20. Conclusion and Key Takeaways Security Measures The importance of implementing robust security measures to protect critical infrastructure. Government Collaboration The role of collaborative efforts between government entities and industry stakeholders in safeguarding critical infrastructure. Resilient Systems The significance of building resilient systems to withstand cyber attacks and ensure continued functionality. Cybersecurity Training The value of comprehensive cybersecurity training programs for personnel to enhance security awareness.
  • 21. Conclusion and Recommendations Invest in Advanced Cyber Defense Enhance Information Sharing Ensure Regulatory Compliance Establish Rapid Response Protocols