Question
Transitioning from cybersecurity to physical security, this module examines how our nation's critical infrastructure is affected by the vulnerable cyber technology that controls its daily
Transitioning from cybersecurity to physical security, this module examines how our nation's critical infrastructure is affected by the vulnerable cyber technology that controls its daily functions.
In his 2012 Defcon 20 cybersecurity conference presentation, Dan Tentler, founder of the San Diego-based information security consulting firm AtenLabs, shared screenshots of dozens of connected devices he could find on the Internet using a laptop and browser. He was able to access several critical infrastructure systems, showing that they were vulnerable to cyber-attack. His presentation vividly demonstrated that the Internet was not designed with security in mind.
Network-ready industrial control systems that monitor and control the physical processes of machines have become the instruments that contribute to a threat we call physical security. The machines we rely on to supply energy, drinking water, and safe food are at risk. The potential security weakness of SCADA systems was exposed by a cyber-attack against the Natanz Iran uranium enrichment facility. A computer worm, called Stuxnet, caused the facility's control systems to make the centrifuges spin out of control. Stuxnet, a cyber-weapon that changed modern warfare, does not discriminate between nations; it simply attacks and destroys computer-managed machines.
Using three different industries, provide three examples of physical security dangers faced by SCADA (supervisory control and data acquisition) network systems.
After reviewing Presidential Policy Directive 21 (PPD-21), discuss a national policy to strengthen and maintain secure, functioning, and resilient critical infrastructure. What is resilient infrastructure? Provide two examples of how this concept protects people and property.
Step by Step Solution
3.40 Rating (156 Votes )
There are 3 Steps involved in it
Step: 1
Advanced internet communication is now possible via physical and wireless access Currently a broad variety of personal government and business electric devices are connected together to form global co...Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started