01.01.2015 Views

disaster 5th 1108_5th ed 2011 - Homeland Security and Emergency ...

disaster 5th 1108_5th ed 2011 - Homeland Security and Emergency ...

disaster 5th 1108_5th ed 2011 - Homeland Security and Emergency ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

• An attack can be a physical assault against a critical IT<br />

element meaning an attacker changes or destroys data,<br />

modifies programs or takes control of a system (basically<br />

can cause a loss of data “integrity” = data is no good).<br />

• The attack can be from the inside -- meaning private<br />

information could get in the wrong h<strong>and</strong>s <strong>and</strong> become<br />

public or identities stolen (basically “confidentiality”<br />

is broken = data is no longer secure or private).<br />

Cyber attacks target computer networks that run government, financial,<br />

health, emergency m<strong>ed</strong>ical services, public safety, telecommunications,<br />

transportation <strong>and</strong> utility systems - also known as “critical infrastructure”.<br />

Because technologies have improv<strong>ed</strong> our access to information, we have<br />

open<strong>ed</strong> ourselves up for attacks by our enemies to destroy or alter this data.<br />

Cyberterrorism is different than computer crime or “hacktivism” (which<br />

can be costly <strong>and</strong> a pain to fix but doesn’t threaten lives or public safety.)<br />

Cyberterrorism is usually done with a minimal loss of life but there are<br />

some groups that could use cyber attacks or cyber warfare to cause human<br />

casualties or fear by disrupting transportation or public safety systems.<br />

For example, prior to Russia invading Georgia in 2008, Georgian Internet<br />

servers were overload<strong>ed</strong> by multiple coordinat<strong>ed</strong> distribut<strong>ed</strong> denial of<br />

service (or D.D.O.S.) attacks. These attacks crippl<strong>ed</strong> Georgia’s government,<br />

m<strong>ed</strong>ia, communications <strong>and</strong> transportation web sites before <strong>and</strong> after<br />

Russian troops enter<strong>ed</strong> South Ossetia. It’s the first time a cyberattack<br />

coincid<strong>ed</strong> with a shooting war according to some Internet experts. 6<br />

We are not trying to cause worry or panic, but underst<strong>and</strong> the possibility<br />

exists <strong>and</strong> services could be disrupt<strong>ed</strong> or cut off or man-made <strong>disaster</strong>s<br />

could happen due to cyber attacks. For example, services like banking, gas<br />

pumps, or internet access could be down or slow. And some emergency<br />

planners are concern<strong>ed</strong> a cyber attack combin<strong>ed</strong> with a physical act of<br />

terrorism (like a “dirty bomb” or releasing a chemical or biological agent)<br />

could potentially interfere with response capabilities.<br />

As we have seen in news reports, many systems (including military <strong>and</strong><br />

government systems) have been breach<strong>ed</strong> repeat<strong>ed</strong>ly <strong>and</strong> over the course of<br />

many years or even decades by rogue hackers <strong>and</strong> nations. Many experts<br />

feel the next major conflict could be a cyberwar rather than conventional<br />

warfare.<br />

Most countries have agencies committ<strong>ed</strong> to securing <strong>and</strong> monitoring<br />

critical infrastructure <strong>and</strong> share information on a regular basis. Businesses<br />

<strong>and</strong> consumers can help too by taking some preventative measures.<br />

82 www.itsa<strong>disaster</strong>.net or call 1-888-999-4325

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!