Protecting Critical Infrastructures Against Cyber-Attack
eBook - ePub

Protecting Critical Infrastructures Against Cyber-Attack

  1. 100 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Protecting Critical Infrastructures Against Cyber-Attack

About this book

The threat that is posed by "cyber-warriors" is illustrated by recent incidents such as the Year 2000 "Millennium Bug". Strategies to reduce the risk that cyber-attack poses, at both individual and national level, are described and compared with the actions being taken by a number of Western governments.

Tools to learn more effectively

Saving Books

Saving Books

Keyword Search

Keyword Search

Annotating Text

Annotating Text

Listen to it instead

Listen to it instead

Chapter 1
The Vulnerabilities of National Infrastructures

Infrastructure Interdependencies

The potential vulnerability of a single integrated infrastructure system is compounded by the interdependence that arises between infrastructures. This is because the provision of service by one system generally depends on services from other infrastructures. Identifying such interdependence was an important part of the preparation for the year 2000 (Y2K) rollover, when managers were in danger of being caught out by failures in systems on which they were dependent.
One particularly revealing study for the Cabinet Office in the UK analysed 11 infrastructures: fuel, utilities, transport, finance, the supply of food and goods, communication, emergency services, social services, justice, health services and weather forecasting.2 Each was then broken down into 59 'processes', each of which was examined to identify the generic actions required for their operation. It was thus possible to identify for each process which other processes it depended upon.
This analysis identified the most critical processes on which the greatest number of others depends. Table 1 (see over) shows the most important ones. The table shows the number of critical dependencies (C); the number of non-critical dependencies (N); and the sum of both (T). There are four processes in the most critical category, and eight in the next tier of criticality. Not surprisingly, telecommunications and electric power are the most critical processes, on which virtually all the others depend. The supply of transport fuel and the road infrastructure rank third and fourth, since most material goods move from producer
Table 1 The Most Critical Infrastructure Processes
Infrastructure Process C (Critical) N (Non-Critical) T (Total)
Telecommunications 49 9 58
Electricity 56 1 57
Fuel supplies for transport 45 4 49
Road infrastructure 43 6 49
Clean water 26 3 29
Fund transfers 17 3 20
Postal service 14 3 17
Gas supplies 13 3 16
Sanitation and waste disposal 11 4 15
Fire and rescue service 11 2 13
Weather information 9 10 19
Rail transport 8 11 19
to consumer by road. The next tier includes the supply of water and gas, the movement of funds and the emergency services. These central systems are the ones a state-supported attacker is most likely to target.

Infrastructure failures and infrastructure attacks

The concerns over infrastructure vulnerability are to a large extent based on the extrapolation of trends and plausibility arguments. What are the threats that would justify a major national defence effort? First, both strategic and theatre infrastructure systems have always been targets for military attack. Tying the parts of these infrastructures together through the use of information technology opens the possibility of new ways to attack the same targets, and hence new requirements for civil and military defence.
Second, infrastructure systems fail due to the malfunction of their parts and the stress of the natural environment. The interconnection of systems increases the likelihood that failure at one location will affect ever-larger service areas.
Third, there is a growing body of experience relating specifically to infrastructure attacks by cyber-techniques, or where cyber related vulnerabilities have played an important part. Two cases are noteworthy. On 7 February 2000, two websites were subjected to a distributed denial of service attack. To mount such an attack, the attacker secures access to a number of unprotected computers and instructs them to send a large number of messages to the target website, either requesting information and hence saturating the target's input capacity, or transmitting invalid information that causes the target site to crash. The first attack was on Yahoo at 1:10pm Eastern Standard Time (EST), and shut the site down for five hours.3 Yahoo is visited by 8.7 million (m) users per day, and is an important part of the Internet because it serves as a portal to locate other sites or information. At 2pm on the same day, Buy.com was attacked and closed down for six hours. This e-commerce sales site is visited by 122,000 users per day. On 8 February Amazon.com, a retail sales site visited by 892,000 users daily, was closed for 3.75 hours; the CNN news site, with 642,000 users a day, was closed for 3.5 hours; and the eBay auction site, with 1.68m users, was closed for five hours. This pattern was repeated on 9 February. The E*Trade brokerage site, with 183,000 users daily, was closed for 2.75 hours and ZDNet (734,000 users) closed for 3.25 hours.4
The cost of these attacks is difficult to ascertain.5 Subsequent estimates have put the cost at hundreds of millions of dollars, but such numbers are quite soft.6 When dealing with insurers, or to impress policymakers, there is an incentive to inflate the figures, and when dealing with shareholders and regulators, there is an incentive to deflate them.
Although not primarily cyber-related, protests against rising fuel prices in the UK in September 2000 illustrate the possible effects of an attack on a national infrastructure. On 7 September 2000, protesters blockaded the British Shell refinery at Stanlow. By 10 September, there were blockades at 11 refineries and fuel depots. The rate of departure of fuel tankers from a typical refinery was reduced from one every three minutes to one every hour, for emergency services only. By 12 September, fuel supplies were reduced to zero or near zero at 320 of 960 Texaco filling stations, 350 of 1,600 Esso stations and 600 of 1,500 BP stations; the situation was similar for other chains. By the morning of 13 September, petrol companies estimated that 90% of their stations would run out of fuel.7
These protests illustrate the effectiveness of an attack on an infrastructure on which a large number of other systems depends, and provides support for the infrastructure interdependency analysis shown in Table 1.8 Panic buying of bread and milk ensued. Supermarket chain Safeway instituted rationing and Asda said it could not guarantee supplies beyond 16 September. The Royal Mail warned that it had supplies for only one more day of deliveries in some areas. Banks warned that they were running out of cash. The British Airports Authority advised airlines to refuel at Heathrow or Gatwick because these airports were served by private pipelines. Bus operators claimed that they had fuel to provide for 75% of normal service until 15 September. Train operators reported that they had supplies only until 15 September. The Confederation of British Industry stated that production lines would start shutting down because of loss of raw materials, and that there was no storage available for unshipped inventory.9
The protesters withdrew their blockades on 14 September when it became apparent that public opinion was turning against them.10 The British Institute of Directors said UK companies faced a loss of $1,4 billion; the hotel industry, manufacturing and transport were especially badly hit. The London Chamber of Commerce estimated that the fuel crisis was costing £250m per day, and that 10% of the UK's daily output of £2.5bn was being lost. The loss to businesses in London was £5om per day.
This attack was made more effective through the widespread use of information technology. Mobile phones allowed the rapid deployment of protesters through organised call networks. Information technology also allowed the need-related delivery of raw materials and goods, resulting in smaller inventories less capable of supporting normal operations over extended periods of disruption.
These examp...

Table of contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Contents
  5. Glossary
  6. Introduction
  7. Chapter 1 The Vulnerabilities of National Infrastructure
  8. Chapter 2 Strategic Defence Options
  9. Chapter 3 Implementing National Strategies: Actions and Actors
  10. Chapter 4 Selecting a Strategy
  11. Chapter 5 Strategic Options
  12. Chapter 6 Protecting Infrastructures in the US and UK
  13. Chapter 7 The Broader Applicability of the Strategic Framework
  14. Conclusion
  15. Notes
  16. About the author
  17. About The International Institute for Strategic Studies

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn how to download books offline
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 990+ topics, we’ve got you covered! Learn about our mission
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more about Read Aloud
Yes! You can use the Perlego app on both iOS and Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app
Yes, you can access Protecting Critical Infrastructures Against Cyber-Attack by Stephen Lukasik in PDF and/or ePUB format, as well as other popular books in Computer Science & Computer Science General. We have over one million books available in our catalogue for you to explore.