disaster 5th 1108_5th ed 2011 - Homeland Security and Emergency ...
disaster 5th 1108_5th ed 2011 - Homeland Security and Emergency ...
disaster 5th 1108_5th ed 2011 - Homeland Security and Emergency ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
• An attack can be a physical assault against a critical IT<br />
element meaning an attacker changes or destroys data,<br />
modifies programs or takes control of a system (basically<br />
can cause a loss of data “integrity” = data is no good).<br />
• The attack can be from the inside -- meaning private<br />
information could get in the wrong h<strong>and</strong>s <strong>and</strong> become<br />
public or identities stolen (basically “confidentiality”<br />
is broken = data is no longer secure or private).<br />
Cyber attacks target computer networks that run government, financial,<br />
health, emergency m<strong>ed</strong>ical services, public safety, telecommunications,<br />
transportation <strong>and</strong> utility systems - also known as “critical infrastructure”.<br />
Because technologies have improv<strong>ed</strong> our access to information, we have<br />
open<strong>ed</strong> ourselves up for attacks by our enemies to destroy or alter this data.<br />
Cyberterrorism is different than computer crime or “hacktivism” (which<br />
can be costly <strong>and</strong> a pain to fix but doesn’t threaten lives or public safety.)<br />
Cyberterrorism is usually done with a minimal loss of life but there are<br />
some groups that could use cyber attacks or cyber warfare to cause human<br />
casualties or fear by disrupting transportation or public safety systems.<br />
For example, prior to Russia invading Georgia in 2008, Georgian Internet<br />
servers were overload<strong>ed</strong> by multiple coordinat<strong>ed</strong> distribut<strong>ed</strong> denial of<br />
service (or D.D.O.S.) attacks. These attacks crippl<strong>ed</strong> Georgia’s government,<br />
m<strong>ed</strong>ia, communications <strong>and</strong> transportation web sites before <strong>and</strong> after<br />
Russian troops enter<strong>ed</strong> South Ossetia. It’s the first time a cyberattack<br />
coincid<strong>ed</strong> with a shooting war according to some Internet experts. 6<br />
We are not trying to cause worry or panic, but underst<strong>and</strong> the possibility<br />
exists <strong>and</strong> services could be disrupt<strong>ed</strong> or cut off or man-made <strong>disaster</strong>s<br />
could happen due to cyber attacks. For example, services like banking, gas<br />
pumps, or internet access could be down or slow. And some emergency<br />
planners are concern<strong>ed</strong> a cyber attack combin<strong>ed</strong> with a physical act of<br />
terrorism (like a “dirty bomb” or releasing a chemical or biological agent)<br />
could potentially interfere with response capabilities.<br />
As we have seen in news reports, many systems (including military <strong>and</strong><br />
government systems) have been breach<strong>ed</strong> repeat<strong>ed</strong>ly <strong>and</strong> over the course of<br />
many years or even decades by rogue hackers <strong>and</strong> nations. Many experts<br />
feel the next major conflict could be a cyberwar rather than conventional<br />
warfare.<br />
Most countries have agencies committ<strong>ed</strong> to securing <strong>and</strong> monitoring<br />
critical infrastructure <strong>and</strong> share information on a regular basis. Businesses<br />
<strong>and</strong> consumers can help too by taking some preventative measures.<br />
82 www.itsa<strong>disaster</strong>.net or call 1-888-999-4325