Protecting Critical Infrastructures Against Cyber-Attack
eBook - ePub

Protecting Critical Infrastructures Against Cyber-Attack

  1. 100 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Protecting Critical Infrastructures Against Cyber-Attack

Book details
Book preview
Table of contents
Citations

About This Book

The threat that is posed by "cyber-warriors" is illustrated by recent incidents such as the Year 2000 "Millennium Bug". Strategies to reduce the risk that cyber-attack poses, at both individual and national level, are described and compared with the actions being taken by a number of Western governments.

Frequently asked questions

Simply head over to the account section in settings and click on ā€œCancel Subscriptionā€ - itā€™s as simple as that. After you cancel, your membership will stay active for the remainder of the time youā€™ve paid for. Learn more here.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Both plans give you full access to the library and all of Perlegoā€™s features. The only differences are the price and subscription period: With the annual plan youā€™ll save around 30% compared to 12 months on the monthly plan.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, weā€™ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes, you can access Protecting Critical Infrastructures Against Cyber-Attack by Stephen Lukasik in PDF and/or ePUB format, as well as other popular books in Computer Science & Computer Science General. We have over one million books available in our catalogue for you to explore.

Information

Publisher
Routledge
Year
2020
ISBN
9781136054488
Edition
1

Chapter 1
The Vulnerabilities of National Infrastructures

Infrastructure Interdependencies

The potential vulnerability of a single integrated infrastructure system is compounded by the interdependence that arises between infrastructures. This is because the provision of service by one system generally depends on services from other infrastructures. Identifying such interdependence was an important part of the preparation for the year 2000 (Y2K) rollover, when managers were in danger of being caught out by failures in systems on which they were dependent.
One particularly revealing study for the Cabinet Office in the UK analysed 11 infrastructures: fuel, utilities, transport, finance, the supply of food and goods, communication, emergency services, social services, justice, health services and weather forecasting.2 Each was then broken down into 59 'processes', each of which was examined to identify the generic actions required for their operation. It was thus possible to identify for each process which other processes it depended upon.
This analysis identified the most critical processes on which the greatest number of others depends. Table 1 (see over) shows the most important ones. The table shows the number of critical dependencies (C); the number of non-critical dependencies (N); and the sum of both (T). There are four processes in the most critical category, and eight in the next tier of criticality. Not surprisingly, telecommunications and electric power are the most critical processes, on which virtually all the others depend. The supply of transport fuel and the road infrastructure rank third and fourth, since most material goods move from producer
Table 1 The Most Critical Infrastructure Processes
Infrastructure Process C (Critical) N (Non-Critical) T (Total)
Telecommunications 49 9 58
Electricity 56 1 57
Fuel supplies for transport 45 4 49
Road infrastructure 43 6 49
Clean water 26 3 29
Fund transfers 17 3 20
Postal service 14 3 17
Gas supplies 13 3 16
Sanitation and waste disposal 11 4 15
Fire and rescue service 11 2 13
Weather information 9 10 19
Rail transport 8 11 19
to consumer by road. The next tier includes the supply of water and gas, the movement of funds and the emergency services. These central systems are the ones a state-supported attacker is most likely to target.

Infrastructure failures and infrastructure attacks

The concerns over infrastructure vulnerability are to a large extent based on the extrapolation of trends and plausibility arguments. What are the threats that would justify a major national defence effort? First, both strategic and theatre infrastructure systems have always been targets for military attack. Tying the parts of these infrastructures together through the use of information technology opens the possibility of new ways to attack the same targets, and hence new requirements for civil and military defence.
Second, infrastructure systems fail due to the malfunction of their parts and the stress of the natural environment. The interconnection of systems increases the likelihood that failure at one location will affect ever-larger service areas.
Third, there is a growing body of experience relating specifically to infrastructure attacks by cyber-techniques, or where cyber related vulnerabilities have played an important part. Two cases are noteworthy. On 7 February 2000, two websites were subjected to a distributed denial of service attack. To mount such an attack, the attacker secures access to a number of unprotected computers and instructs them to send a large number of messages to the target website, either requesting information and hence saturating the target's input capacity, or transmitting invalid information that causes the target site to crash. The first attack was on Yahoo at 1:10pm Eastern Standard Time (EST), and shut the site down for five hours.3 Yahoo is visited by 8.7 million (m) users per day, and is an important part of the Internet because it serves as a portal to locate other sites or information. At 2pm on the same day, Buy.com was attacked and closed down for six hours. This e-commerce sales site is visited by 122,000 users per day. On 8 February Amazon.com, a retail sales site visited by 892,000 users daily, was closed for 3.75 hours; the CNN news site, with 642,000 users a day, was closed for 3.5 hours; and the eBay auction site, with 1.68m users, was closed for five hours. This pattern was repeated on 9 February. The E*Trade brokerage site, with 183,000 users daily, was closed for 2.75 hours and ZDNet (734,000 users) closed for 3.25 hours.4
The cost of these attacks is difficult to ascertain.5 Subsequent estimates have put the cost at hundreds of millions of dollars, but such numbers are quite soft.6 When dealing with insurers, or to impress policymakers, there is an incentive to inflate the figures, and when dealing with shareholders and regulators, there is an incentive to deflate them.
Although not primarily cyber-related, protests against rising fuel prices in the UK in September 2000 illustrate the possible effects of an attack on a national infrastructure. On 7 September 2000, protesters blockaded the British Shell refinery at Stanlow. By 10 September, there were blockades at 11 refineries and fuel depots. The rate of departure of fuel tankers from a typical refinery was reduced from one every three minutes to one every hour, for emergency services only. By 12 September, fuel supplies were reduced to zero or near zero at 320 of 960 Texaco filling stations, 350 of 1,600 Esso stations and 600 of 1,500 BP stations; the situation was similar for other chains. By the morning of 13 September, petrol companies estimated that 90% of their stations would run out of fuel.7
These protests illustrate the effectiveness of an attack on an infrastructure on which a large number of other systems depends, and provides support for the infrastructure interdependency analysis shown in Table 1.8 Panic buying of bread and milk ensued. Supermarket chain Safeway instituted rationing and Asda said it could not guarantee supplies beyond 16 September. The Royal Mail warned that it had supplies for only one more day of deliveries in some areas. Banks warned that they were running out of cash. The British Airports Authority advised airlines to refuel at Heathrow or Gatwick because these airports were served by private pipelines. Bus operators claimed that they had fuel to provide for 75% of normal service until 15 September. Train operators reported that they had supplies only until 15 September. The Confederation of British Industry stated that production lines would start shutting down because of loss of raw materials, and that there was no storage available for unshipped inventory.9
The protesters withdrew their blockades on 14 September when it became apparent that public opinion was turning against them.10 The British Institute of Directors said UK companies faced a loss of $1,4 billion; the hotel industry, manufacturing and transport were especially badly hit. The London Chamber of Commerce estimated that the fuel crisis was costing Ā£250m per day, and that 10% of the UK's daily output of Ā£2.5bn was being lost. The loss to businesses in London was Ā£5om per day.
This attack was made more effective through the widespread use of information technology. Mobile phones allowed the rapid deployment of protesters through organised call networks. Information technology also allowed the need-related delivery of raw materials and goods, resulting in smaller inventories less capable of supporting normal operations over extended periods of disruption.
These examp...

Table of contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Contents
  5. Glossary
  6. Introduction
  7. Chapter 1 The Vulnerabilities of National Infrastructure
  8. Chapter 2 Strategic Defence Options
  9. Chapter 3 Implementing National Strategies: Actions and Actors
  10. Chapter 4 Selecting a Strategy
  11. Chapter 5 Strategic Options
  12. Chapter 6 Protecting Infrastructures in the US and UK
  13. Chapter 7 The Broader Applicability of the Strategic Framework
  14. Conclusion
  15. Notes
  16. About the author
  17. About The International Institute for Strategic Studies