Abstract
The issue of cyber-security is currently having and will continue to have a major impact on organized society. Cyber-threats to infrastructure, and other assets, are of growing concern to policymakers throughout the world. For example, the President of the United States (US), in 2009, declared cyber threats to be among “the most serious economic and national security challenges we face as a nation” and stated that “America’s economic prosperity in the 21st century will depend on cyber-security.” Cyber-attacks might include denial of service, theft or manipulation of data. Information and communications technology (ICT) is becoming ubiquitous and many ICT devices and other components are interdependent. Therefore disruption of one component may have a negative, cascading effect on others. It is clear that cyber-security issues include not only the threats associated with information technology but also involves physical threats to Critical Infrastructure (CI). Damage to critical infrastructure through a cyber-based attack could have a significant impact on security at the national level, the economy, and the livelihood and safety of citizens. It is therefore important that national governments develop comprehensive strategies to deal with issues related to cyber-security. As critical infrastructure becomes more dependent on computer technology and increasingly tied to the internet, cyber-attacks against communication networks and system are growing in number and are becoming more sophisticated. Several examples are presented, that illustrate the impact of cyber-attacks on international security as well as attacks on critical infrastructure. In addition, a number of approaches that might help deal with cyber-security are suggested including the development of public-private partnerships.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsAbbreviations
- APT:
-
Advanced persistent threats
- ATM:
-
Automated teller machine
- CCSMM:
-
Community cyber security maturity model
- CI:
-
Critical infrastructure
- CIO:
-
Chief information officer
- CIP:
-
Critical infrastructure protection
- CMU:
-
Carnegie Mellon University
- CP:
-
Cyber-physical
- DHS:
-
Department of Homeland Security
- DOD:
-
Department of Defense
- DSL:
-
Digital subscriber line
- ECA:
-
Electronic control units
- EPA:
-
Environmental Protection Agency
- FAA:
-
Federal Aviation Administration
- FBI:
-
Federal Bureau of Investigation
- FIMSA:
-
Federal Information Security Act
- GAO:
-
Government Accountability Office
- GDP:
-
Gross domestic product
- ICS:
-
Industrial control Systems
- ICT:
-
Information and communications technology
- IEC:
-
International Electrotechnical Commission
- ISAC:
-
Information Sharing and Analysis Center
- ISAO:
-
Information Sharing and Analysis Organization
- ISO:
-
International Standards Organization
- ISP:
-
Internet service providers
- IT:
-
Information technology
- ITC:
-
Integrated Intelligence Center
- ITL:
-
Information Technology Laboratory
- MSISAC:
-
Multistate Information Sharing and Analysis Center
- MTS:
-
Marine transportation system
- NCCIC:
-
National Cyber Security and Communications Integration Center
- NCSA:
-
National Cyber Security Authority
- NIST:
-
National Institute of Science and Technology
- OMB:
-
Office of management and budget
- POTW:
-
Publically owned treatment works
- PPDR:
-
Public protection and disaster relief
- PPP:
-
Public private partnership
- PWS:
-
Public water system
- SCADA:
-
Supervisory control and data acquisition
- TETRA:
-
TErrestrial Trunked RAdio
- TSP:
-
Thrift savings plan
- US:
-
United States
- US CERT:
-
US Computer Emergency Readiness Team
- V2X:
-
Vehicle to X (infrastructure, vehicle)
References
Accessed on February 11, 2016 from http://qz.com/587520/russian-hackers-are-suspected-in-a-cyber-attack-that-caused-a-huge-blackout-in-ukraine/
Accessed on December 17, 2015 from http://www.nga.org/cms/about
Accessed on March 7, 2016 from http://www.techinsider.io/cyberattacks-2015-12
Accessed on March 7, 2016 from http://www.nytimes.com/interactive/2015/02/05/technology/recent-cyberattacks.html?_r=0
Blute, T. (2015). Enhancing the role of fusion centers in cybersecurity. Washington, D.C.
Clapper, J. R. (2012, January 31). Director of National Intelligence. Unclassified statement for the record on the worldwide threat assessment of the US intelligence community for the senate select committee on intelligence.
Crouch, J. E., & McKee, L. K. Jr., (2011, February 25). Cybersecurity at the state and municipality levels where do we stand? In Improving the Future of Cyberspace…Issues, Ideas, Answers. NSCI, 2011. 110 Royal Aberdeen. Smithfield, VA.
Fischer, E. A., Liu, E. C., Rollins, J., & Theohary, C. A. (2013, March 1). The 2013 cybersecurity executive order: Overview and considerations for congress. Congressional Research Service, 7-5700. www.crs.gov
Janke, R., Tryby, M. E., & Clark, R. M. (2014). Protecting water supply critical infrastructure: An overview. In M. C. Robert & S. Hakim (Eds.), Securing water and wastewater systems: Global experiences. Switzerland: Springer.
Martin, P. K. (2012, February 29). Inspector General, National Aeronautics and Space Administration. NASA cybersecurity: An examination of the agency’s information security. testimony before the Subcommittee on Investigations and Oversight, Committee on Science, Space, and Technology, House of Representatives, Washington, D.C.
Obama, B. (2009, May 29) Remarks by the President on Securing Our Nation’s Cyber Infrastructure, Washington, D.C.
Panetta, L. E. (2012, October 11). Secretary of Defense, Remarks by Secretary Panetta on Cybersecurity to the Business Executives for National Security, New York City.
Pub. L. No. 107-305 (2002, November 27). 15 U.S.C.§ 7406(c)
Saporito, L. (2014, October 27). The cybersecurity workforce: States’ needs and opportunities. Washington, DC: National Governors Association Center for Best Practices.
Title III of the E-Government Act of 2002, Pub. L. No. 107-347, December 17, 2002; 44 U.S.C 3541.
United States Government Accountability Office (GAO). (2011, February). High risk series: An update, GAO-11-278, Washington, D.C.
United States Government Accountability Office (GAO). (2013 February). Cybersecurity national strategy, roles, and responsibilities need to be better defined and more effectively implemented, GAO-13-187.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Clark, R.M., Hakim, S. (2017). Protecting Critical Infrastructure at the State, Provincial, and Local Level: Issues in Cyber-Physical Security. In: Clark, R., Hakim, S. (eds) Cyber-Physical Security. Protecting Critical Infrastructure, vol 3. Springer, Cham. https://doi.org/10.1007/978-3-319-32824-9_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-32824-9_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-32822-5
Online ISBN: 978-3-319-32824-9
eBook Packages: Political Science and International StudiesPolitical Science and International Studies (R0)