Skip to main content

Protecting Critical Infrastructure at the State, Provincial, and Local Level: Issues in Cyber-Physical Security

  • Chapter
  • First Online:

Part of the book series: Protecting Critical Infrastructure ((PCIN,volume 3))

Abstract

The issue of cyber-security is currently having and will continue to have a major impact on organized society. Cyber-threats to infrastructure, and other assets, are of growing concern to policymakers throughout the world. For example, the President of the United States (US), in 2009, declared cyber threats to be among “the most serious economic and national security challenges we face as a nation” and stated that “America’s economic prosperity in the 21st century will depend on cyber-security.” Cyber-attacks might include denial of service, theft or manipulation of data. Information and communications technology (ICT) is becoming ubiquitous and many ICT devices and other components are interdependent. Therefore disruption of one component may have a negative, cascading effect on others. It is clear that cyber-security issues include not only the threats associated with information technology but also involves physical threats to Critical Infrastructure (CI). Damage to critical infrastructure through a cyber-based attack could have a significant impact on security at the national level, the economy, and the livelihood and safety of citizens. It is therefore important that national governments develop comprehensive strategies to deal with issues related to cyber-security. As critical infrastructure becomes more dependent on computer technology and increasingly tied to the internet, cyber-attacks against communication networks and system are growing in number and are becoming more sophisticated. Several examples are presented, that illustrate the impact of cyber-attacks on international security as well as attacks on critical infrastructure. In addition, a number of approaches that might help deal with cyber-security are suggested including the development of public-private partnerships.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Abbreviations

APT:

Advanced persistent threats

ATM:

Automated teller machine

CCSMM:

Community cyber security maturity model

CI:

Critical infrastructure

CIO:

Chief information officer

CIP:

Critical infrastructure protection

CMU:

Carnegie Mellon University

CP:

Cyber-physical

DHS:

Department of Homeland Security

DOD:

Department of Defense

DSL:

Digital subscriber line

ECA:

Electronic control units

EPA:

Environmental Protection Agency

FAA:

Federal Aviation Administration

FBI:

Federal Bureau of Investigation

FIMSA:

Federal Information Security Act

GAO:

Government Accountability Office

GDP:

Gross domestic product

ICS:

Industrial control Systems

ICT:

Information and communications technology

IEC:

International Electrotechnical Commission

ISAC:

Information Sharing and Analysis Center

ISAO:

Information Sharing and Analysis Organization

ISO:

International Standards Organization

ISP:

Internet service providers

IT:

Information technology

ITC:

Integrated Intelligence Center

ITL:

Information Technology Laboratory

MSISAC:

Multistate Information Sharing and Analysis Center

MTS:

Marine transportation system

NCCIC:

National Cyber Security and Communications Integration Center

NCSA:

National Cyber Security Authority

NIST:

National Institute of Science and Technology

OMB:

Office of management and budget

POTW:

Publically owned treatment works

PPDR:

Public protection and disaster relief

PPP:

Public private partnership

PWS:

Public water system

SCADA:

Supervisory control and data acquisition

TETRA:

TErrestrial Trunked RAdio

TSP:

Thrift savings plan

US:

United States

US CERT:

US Computer Emergency Readiness Team

V2X:

Vehicle to X (infrastructure, vehicle)

References

  • Accessed on February 11, 2016 from http://qz.com/587520/russian-hackers-are-suspected-in-a-cyber-attack-that-caused-a-huge-blackout-in-ukraine/

  • Accessed on December 17, 2015 from http://www.nga.org/cms/about

  • Accessed on March 7, 2016 from http://www.techinsider.io/cyberattacks-2015-12

  • Accessed on March 7, 2016 from http://www.nytimes.com/interactive/2015/02/05/technology/recent-cyberattacks.html?_r=0

  • Blute, T. (2015). Enhancing the role of fusion centers in cybersecurity. Washington, D.C.

    Google Scholar 

  • Clapper, J. R. (2012, January 31). Director of National Intelligence. Unclassified statement for the record on the worldwide threat assessment of the US intelligence community for the senate select committee on intelligence.

    Google Scholar 

  • Crouch, J. E., & McKee, L. K. Jr., (2011, February 25). Cybersecurity at the state and municipality levels where do we stand? In Improving the Future of Cyberspace…Issues, Ideas, Answers. NSCI, 2011. 110 Royal Aberdeen. Smithfield, VA.

    Google Scholar 

  • Fischer, E. A., Liu, E. C., Rollins, J., & Theohary, C. A. (2013, March 1). The 2013 cybersecurity executive order: Overview and considerations for congress. Congressional Research Service, 7-5700. www.crs.gov

  • Janke, R., Tryby, M. E., & Clark, R. M. (2014). Protecting water supply critical infrastructure: An overview. In M. C. Robert & S. Hakim (Eds.), Securing water and wastewater systems: Global experiences. Switzerland: Springer.

    Google Scholar 

  • Martin, P. K. (2012, February 29). Inspector General, National Aeronautics and Space Administration. NASA cybersecurity: An examination of the agency’s information security. testimony before the Subcommittee on Investigations and Oversight, Committee on Science, Space, and Technology, House of Representatives, Washington, D.C.

    Google Scholar 

  • Obama, B. (2009, May 29) Remarks by the President on Securing Our Nation’s Cyber Infrastructure, Washington, D.C.

    Google Scholar 

  • Panetta, L. E. (2012, October 11). Secretary of Defense, Remarks by Secretary Panetta on Cybersecurity to the Business Executives for National Security, New York City.

    Google Scholar 

  • Pub. L. No. 107-305 (2002, November 27). 15 U.S.C.§ 7406(c)

    Google Scholar 

  • Saporito, L. (2014, October 27). The cybersecurity workforce: States’ needs and opportunities. Washington, DC: National Governors Association Center for Best Practices.

    Google Scholar 

  • Title III of the E-Government Act of 2002, Pub. L. No. 107-347, December 17, 2002; 44 U.S.C 3541.

    Google Scholar 

  • United States Government Accountability Office (GAO). (2011, February). High risk series: An update, GAO-11-278, Washington, D.C.

    Google Scholar 

  • United States Government Accountability Office (GAO). (2013 February). Cybersecurity national strategy, roles, and responsibilities need to be better defined and more effectively implemented, GAO-13-187.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Robert M. Clark .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Clark, R.M., Hakim, S. (2017). Protecting Critical Infrastructure at the State, Provincial, and Local Level: Issues in Cyber-Physical Security. In: Clark, R., Hakim, S. (eds) Cyber-Physical Security. Protecting Critical Infrastructure, vol 3. Springer, Cham. https://doi.org/10.1007/978-3-319-32824-9_1

Download citation

Publish with us

Policies and ethics