User talk:Dolmido

critical information infrastructure
“Those infrastructures which are essential for the maintenance of vital societal functions, health, safety, security, economic or social well-being of people, and the disruption or destruction of which would have serious consequences.” Critical Information Infrastructure (CII) “Material and digital assets, networks, services, and installations that, if disrupted or destroyed, would have a serious impact on the health, security, or economic wellbeing of citizens and the efficient function of a country’s government.” IMPORTANCE OF CII SECURITY ✓ Critical Information Infrastructure plays a vital role for the well-functioning of society and economy ✓ A cyber attack or an outage affecting these infrastructures could have cascading effects on large part of the population ✓ Cyberattacks on critical infrastructure have become increasingly more complex and more disruptive, causing systems to shut-down, disrupting operations, or simply enabling attackers to remotely control affected systems ✓ Traditionally, control systems were segregated from the open internet as they were deployed on air-gapped networks and under tight physical security ✓ Eliminating air-gap security in favour of improving efficiency and cutting down costs has opened critical infrastructures to threats and cyberattacks ✓ Smart sensors and communication technologies bundled into various industrial control systems expose infrastructures and organizations to risks. (IoT) ✓ Cyber attacks on critical infrastructures can have a significant economic impact, especially when targeted in conflict between nations ✓ Securing these systems is not a matter of fully reverting to physical access, but a matter of understanding how internet-connected control systems work, how they are configured, and how they are accessed ✓ Visibility and management is key in beefing up security, but security and IT professionals must be aware of the risks and set-in place security controls aimed at reducing the impact of a potential cyberattack and increasing the cost of attack for threat actors