Protecting Critical Infrastructure

Over many years, threat actors have consistently targeted organisations in the energy, utility and related sectors and cyber attacks on critical infrastructure have become increasingly more complex and more disruptive, causing systems to shut-down, disrupting operations, or simply enabling attackers to remotely control affected systems.

Critical infrastructure and industrial operations have evolved and become digitised in the same way as other modern industries, however, industrial control systems remain in a unique hybrid stage, somewhere between their analog history and the digital future. 

Critical infrastructure describes the physical and cyber systems and assets that are so vital to a country that their incapacity or destruction would have a debilitating impact on our physical or economic security or public health or safety. In most countries it is the government's responsibility for the national security, public safety, the effective functioning of the economy and the continuity of government services in case of an emergency or crisis. Unhappily, such events are more frequent:

  • After the recent ransomware attack on a major petroleum pipeline in the US, the Department of Homeland Security’s (DHS) has announced a Security Directive that will enable it to better  respond to threats to critical companies in the pipeline sector. 
  • In February 2020, Saudi authorities reported that their public petroleum and natural gas company Saudi Aramco has seen a significant increase in cyber attack attempts following a huge initial attack in 2012 when a  Virus damaged around 30,000 computers.
  • New Zealand’s Central Bank had a large data breach, where commercially and individually sensitive information was stolen by cyber attackers.
  • Irelands Health Service IT systems shut down and remain partially disabled following a wide ranging ransomware incident. 
  • In both Israel and the Florida potentially lethal attempts to sabotage control systems in the water distribution network were thwarted by alert supervisors. 

The disruption caused due to a successful cyber attack on a nation’s critical agencies can be far-reaching. It has the potential of causing a major loss of money, time, and even lives. 

Critical infrastructure cyber security has been gaining momentum in the US, culminating in a new security directive, as cyber-attacks continue to target infrastructure companies. “The cybersecurity landscape is constantly evolving and we must adapt to address new and emerging threats,” said Secretary of Homeland Security Alejandro N. Mayra.  

The DHS is focussing its efforts with owners and operators and other government agencies to enhance the physical security preparedness of US hazardous liquid and natural gas pipeline systems and the new Security Directive will require critical pipeline owners and operators in the US to:

  • Report confirmed and potential cybersecurity incidents to the DHS Cybersecurity and Infrastructure Security Agency (CIA).
  • Designate a Cybersecurity Coordinator, to be available 24 hours a day, seven days a week.
  • Review their current practices as well as to identify any gaps and related remediation measures to address cyber-related risks and report the results to TSA and CIA within 30 days.

Visibility and management are the key factors  in security for Supervisory Control and Data Acquisitions (SCADA) systems, but security and IT professionals must be aware of the risks and set in place security controls aimed at reducing the impact of a potential cyber attacks and the increasing the costs of these attacks.

Currently around 103 countries have published their national cyber security strategies. As the US lead agency for protecting critical infrastructure against cyber security threats, CIA provides cyber security resources to mitigate potential risks, including through a dedicated hub that disseminates information to organization, communities, and individuals about how to better protect against ransomware attacks. 

Cyber attacks on critical infrastructures can have a significant economic impact, especially when targeted in conflict between nations. Securing these systems is not a matter of fully reverting back to physical access, but a matter of understanding how Internet-connected control systems work, how they are configured, and how they are accessed. 

Dept. of Homeland Security:    World Trade Organisation:    CIPSEC EU:     

Security Boulevard:       Mission Secure:       I-HLS:       Image: Unsplash

You Might Also Read:

A New Generation Of Critical Vulnerabilities:

Focused Security Analysis For Your Organisation’s IT Systems:

 

« NCSC Focus On Ransomware Attacks
Why Is It So Difficult To Convict Cyber Criminals? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CCN-CERT

CCN-CERT

CCN-CERT is the Spanish national government computer security incident response centre.

STMicroelectronics

STMicroelectronics

ST is a global semiconductor leader delivering intelligent and energy-efficient products and solutions that power the electronics at the heart of everyday life.

RazorSecure

RazorSecure

RazorSecure offers products and services to enhance railway cyber security, by protecting and monitoring networks and key systems.

H-11 Digital Forensics

H-11 Digital Forensics

H-11 Digital Forensics is a global leader of digital forensic technology.

oneclick

oneclick

oneclick is a central access and distribution platform in the cloud, enabling the management of the entire technology stack for application provisioning.

White Cloud Security

White Cloud Security

White Cloud is a cloud-based Application Trust-Listing security service that prevents unauthorized programs from running on your computers.

Gijima

Gijima

Gijima is one of SA’s leading ICT companies in Cloud & Outsourcing, Systems integration, Human Capital Management & Training, Cybersecurity, and Unified Communications.

ActZero

ActZero

ActZero’s security platform leverages proprietary AI-based systems and full-stack visibility to detect, analyze, contain, and disrupt threats.

Center for Medical Device Cybersecurity (CMDC) - University of Minnesota

Center for Medical Device Cybersecurity (CMDC) - University of Minnesota

CMDC’s mission is to foster university-industry-government partnerships to assure that medical devices are safe and secure from cybersecurity threats.

SecureOps

SecureOps

SecureOps is transforming the Managed Security Service Provider industry by providing tailored cybersecurity solutions proven to protect organizations from cyberattacks.

KATIM

KATIM

KATIM is a leader in the development of innovative secure communication products and solutions for governments and businesses.

Deloitte

Deloitte

Deloitte is a multinational professional services firm providing audit, consulting, financial advisory, risk management, tax, and related services to clients.

Cycurion

Cycurion

Cycurion is a global leading provider of Network Communications and Information Technology Security Solutions.

BitLyft

BitLyft

BitLyft is a managed detection and response provider that is dedicated to delivering unparalleled protection from cyber attacks for organizations of all sizes.

Minorities in Cybersecurity (MiC)

Minorities in Cybersecurity (MiC)

MiC was developed out of a unique passion to help fill the gap that exists in the support and development of women and minority leaders in the cybersecurity field.

Rakuten Maritime

Rakuten Maritime

Rakuten Maritime is your trusted partner in maritime cybersecurity, offering comprehensive and proactive solutions tailored to every stage of a ship’s life cycle.