StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Catastrophic Cyberattack - Essay Example

Cite this document
Summary
Catastrophic Cyber Attack Date Abstract The essay aims to address a two-fold objective, to wit: (1) to identify and describe cyber attacks in a water supply system, and (2) to briefly describe the implications of a cyber attack in a water supply system…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.9% of users find it useful
Catastrophic Cyberattack
Read Text Preview

Extract of sample "Catastrophic Cyberattack"

Catastrophic Cyber Attack The essay aims to address a two-fold objective, to wit to identify and describe cyber attacks in a water supply system, and (2) to briefly describe the implications of a cyber attack in a water supply system. Catastrophic Cyber Attack Introduction Water supply systems are prone to various levels of risks due to major disasters, accidents, and acts of terrorism. Among these causes, the acts of terrorism such as the cyber attack on the infrastructure of the water supply system seriously affects the society and need to be addressed promptly.

A cyber attack has been defined as a computer-to-computer attack that undermines the confidentiality, integrity, or availability of a computer or information resident in it (O’Shea, 2003). Cyber attacks involve virus and worm attacks delivered through vulnerable exploit engines, denial-of-service attacks (DoS), web defacements of informational sites, and unauthorized intrusions into systems (Colarik, 2006, p. 84). According to the CSI/FBI 2005 Computer Crime and Security Survey, rate of losses from attacks are: viruses (33%), unauthorized access (24%), theft of proprietary information (24%), DoS (6%), net abuse (5%), laptop theft (3%), and financial fraud (2%) (Colarik, 2006, p. 83). But for a cyber attack to be successful, phases of attack must also be successful.

The five phases of cyber attacks are reconnaissance, penetration, identifying and expanding internal capabilities, intruder damages the system, and removal of evidence of penetration or theft (Colarik, 2006, p. 83). Cyber attack penetrates the Supervisory Control and Data Acquisition (SCADA) system of a water supply system and poses detrimental effect over the system. Cyber Attack on a Water Supply System During the late 1990s, medium to large water utilities integrated IT and SCADA system. Among of those utilities was the Water Corporation of Western Australia (WCWA), one of the largest utilities in the world (Mays, 2004, p. 5.1).

A cyber attack could cause data alteration and destruction, blocked or rerouted communication, financial damage, disruption of the water utility’s internal operation, and failure of the equipments to operate when needed. However, cyber attacks will not cause immediate water supply disruptions provided that the duration of attacks were not prolonged. In order to understand the impact of cyber attacks to the water supply system, it is important to fully understand the elements of the SCADA system.

The term SCADA refers to plant-computer-based process control systems and computer-based systems. These systems monitor and control remote raw water production and treated water distribution facilities (Mays, 2004, 5.2). Unprotected SCADA network access may lead to cyber attacks; the reason why water utilities should be periodically reviewed and vulnerabilities must be addressed. A detailed vulnerability assessment approach and planning tools were devised to address cyber attacks in the water utilities.

Conclusion Cyber attacks pose the highest risk for water system disruption as it involves unauthorized computer-to-computer connection. In a cyber attack, the use of viruses account for the highest rate of losses. A successful cyber attack involves the completion of reconnaissance up to the removal of penetration evidence. Water supply systems utilize the SCADA system. A break in the security system during cyber attacks could cause detrimental effects on the water supply’s production, treatment, or distribution in the community.

Periodic monitoring and review of assessment and planning tools are necessary to secure the water supply system. References Colarik, A.M. (2006). Current Cyber Attack Methods. Cyber Terrorism: Political and Economic Implications (p. 82-110) Philadelphia: Ideal Group Inc. Mays, L.W. (2004). Cyber Threats and IT/SCADA System Vulnerability. Water Supply Systems Security (p. 5.1-5.10) New York: The McGraw-Hills Company, Inc. O’Shea, K. (2003). Cyber Attack Investigative Tools and Technologies. Institute for Security Technology Studies at Dartmouth College.

Retrieved on June 8, 2011 from http://htcia_siliconvly.org/contacts.htm

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Catastrophic Cyberattack Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from https://studentshare.org/other/1424376-catastrophic-cyberattack
(Catastrophic Cyberattack Essay Example | Topics and Well Written Essays - 500 Words)
https://studentshare.org/other/1424376-catastrophic-cyberattack.
“Catastrophic Cyberattack Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/other/1424376-catastrophic-cyberattack.
  • Cited: 0 times

CHECK THESE SAMPLES OF Catastrophic Cyberattack

The Disaster Management Plan

This essay "The Disaster Management Plan" discusses how the focus in recent years has been shifted from the restoration of services at the earliest possible time to the continuity of the business operations without loss of time.... nbsp; The utility industries are in a very piquant situation in view of various statutory compliances involved in the business operations apart from protection of employees....
9 Pages (2250 words) Essay

Catastrophism or Uniformitarism

Geography is an involving subject, just like the sciences; with influential aspects like catastrophism that seek to explain the genesis of mother… These research findings are funded by governments, non-governmental organizations and institutions of higher learning.... The rock structure, the processes that explain the formations of soil CATASTROPHISM Question a) Scientific decisions are developed from intensive and interactive research findings that involve immense economic implications....
1 Pages (250 words) Essay

Cyberterrorism: What Is It

"Cyberterrorism: What Is It" paper explains what cyberterrorism means.... The term cyberterrorism does not involve inflicting physical harm it does cause damage to computer programs and systems.... These can be disastrous, considering how dependent society is on the computer and the Internet.... hellip; To aid the National Cyber Security Division in carrying out its tasks, the federal government has created another agency in January 2003, the Terrorist Threat Integration Center (TTIC)....
17 Pages (4250 words) Research Proposal

The Concept of Disaster - Accidents and Catastrophes

So for instance, a road accident with fifteen injured people could be considered an accident in a major urban centre while it becomes catastrophic for a small village.... This paper "The Concept of Disaster - Accidents and Catastrophes" focuses on the fact that the long lists of calamities that happened throughout history allowed the classification and in-depth study of their nature, initiation, and propagation in order to reduce man's vulnerability to these risks....
10 Pages (2500 words) Case Study

The Interpretation of Protheros Thoughts in the Book Catastrophes

Prothero, based on the Lisbon earthquake argues that people fail to address one important question; what is the precursor of catastrophic phenomena?... The paper 'The Interpretation of Prothero's Thoughts in the Book Catastrophes' presents Catastrophes in the context of the book by Prothero which refers to events resulting in loss and misfortune....
5 Pages (1250 words) Literature review

Targets for Cyberterrorism

This research will begin with the statement that there were many developments and discoveries during the 20th and 21st centuries, with rapid changes characterizing this era.... The world was changed instantaneously, moving at a pace where there is little room for reflection.... hellip; The researcher states that technology, or to be more precise, the power of the Internet and high-speed computers distinguished the late 20th century and presented a dominant force early in the 21st century and up to now....
42 Pages (10500 words) Research Paper

The Nature of Accidents and Catastrophes

… The paper "The Nature of Accidents and Catastrophes" is an excellent example of a case study on environmental studies.... nbsp;Today, there are many accidents and catastrophes that occur in different parts of the world.... Many people are dying and millions worth of properties go down the drain....
9 Pages (2250 words) Case Study

Malaysia Airlines Flight 379 Disappearance

The author of the following paper "Malaysia Airlines Flight 379 Disappearance" examines and presents the potential causes of the plane's disappearance, investigation and search and, the conspiracy theories behind the disappearance (CBS News 1).... hellip; Malaysia Airlines Flight 370 was an international passenger flight that went on a mission upon leaving Malaysia's Kuala Lumpur International Airport on its way to China's Beijing Capital International Airport, on March 8, 2014, at 12....
7 Pages (1750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us