Critical Infrastructure Security
Critical Infrastructure Security
2. Anthropic nature
• vandalism
• fires
• pollution
What are the examples of critical infrastructure failures?
• building collapses
• water main breaks
• gas pipe ruptures
• dam failures
• steam pipe explosions
• related types of events
What are the effects if the critical infrastructures are not
well maintain?
• disruption to households and businesses
• evacuations
• business closures
• economic loss and clean-up costs
• potential health hazards and environmental impacts
What are the challenges of infrastructure security?
• Operation Complexity.
Operational complexity is a result of internal and external factors impacting
company's ways to manage operations to produce products and services
• Limited Visibility.
The term 'restricted visibility' means any condition in which visibility is
restricted by fog, mist, falling snow, heavy rainstorms, sandstorms or any
other similar causes.
• Misconfigurations.
An incorrect or suboptimal configuration of an information system or system
component that may lead to vulnerabilities
• Multi-Cloud or Hybrid Cloud.
A hybrid cloud—sometimes called a cloud hybrid—is a computing environment
that combines an on-premises datacenter (also called a private cloud) with a
public cloud, allowing data and applications to be shared between them.
• Changing Workloads.
the amount of work or of working time expected or assigned; the amount of
work performed or capable of being performed (as by a mechanical device)
usually within a specific period.
• Shared Responsibility Confusion.
Collaboration between two or more persons or bodies performing the same kind
of activity in the creation of the content of an item. The contribution of each
may form a separate and instinct part of the item, or the contribution of each
may not be separable from that of the other(s).
• Insecure Access.
Improper access control is a vulnerability that occurs when a system does not
properly restrict or enforce access to resources.
• Vendor Lock-In.
Vendor lock-in is a situation in which a customer using a product or service
cannot easily transition to a competitor's product or service. This can be a
major problem, as it can limit the customer's choices and make it more difficult
to get the best possible value for its money.
incorrect or suboptimal configuration of an information system or system
component that may lead to vulnerabilities
Best practices for improving critical infrastructure security
To improve critical infrastructure security, consider leveraging the following best
practices:
1. Risk assessment:
Conducting a risk assessment is a crucial first step in securing critical infrastructure.
The process involves identifying and analyzing the threats and vulnerabilities based on
software and systems used in these critical infrastructure systems.
2. Threat intelligence
Gathering and analyzing threat intelligence is essential for identifying potential threats
to critical infrastructure systems. This process involves monitoring the threat landscape,
including cyber threats, physical threats, and natural threats.
3. Access control:
Implementing strong access control systems can help prevent unauthorized access to
critical infrastructure systems and allows access to only authorized staff. Access control
includes implementing strong authentication measures, such as multi-factor
authentication and limiting access to authorized personnel based on their jobs and
duties.
4. Cyber security measures:
Implement cyber security measures, such as firewalls, to secure the perimeter. Implement
strong intrusion prevention systems, and implement strong encryption protocols. This can
help protect critical infrastructure systems from cyber attacks.