32.6k views
2 votes
The first and most important step in securing and protecting critical assets is identifying the critical information infrastructure. The two important essential sectors of information for this discussion are the public telephone network and wireless satellite networks. A public telephone network is a critical information infrastructure as it describes the telecommunication network with subscribers and allows subscribers to communicate by voice freely. Communication is vital in many sectors related to connecting people from different locations and sharing information for a defined purpose. In relation to national security, communication and sharing information threaten national security when perpetrators of evil acts communicate and organize their attacks to the public. Also, public telephone networks might be a security risk when targeted attacks, DDoS attacks and vulnerabilities in the network device, and human-initiated threats such as insider access. These kinds of attacks are a threat to national security because of allowing unauthorized or third parties to gain access to sensitive and confidential information. When it comes to wireless satellite communications, it covers a large area as it connects to satellites constantly orbiting the earth. In relation to national security, attacks on wireless satellite networks directly impact internet-based devices such as computers, laptops, and mobile phones that threaten public safety. Cross-sector dependencies are common in internet and technology-based settings because of the need to share information across the board. For instance, access and threats to internet-based devices such as personal computers, phones, and laptops further interfere with communication because people communicate using the same devices. Therefore, the attack on wireless satellite networks connected to the said devices will also affect communication using public telephone networks.

My opinion on how a physical attack, a cyber event, or a natural disaster could impact the critical infrastructure.

Physical attack, cyber attack, or natural disaster can impact critical infrastructure. Most of the essential infrastructures are built on technology and internet-based elements. When an individual physically attacks or destroys a computer or a phone, it makes it difficult for the computer or the phone to do its purposes, interfering with critical infrastructure. Here, the device will not communicate, share information, or access the internet, which interferes with critical infrastructure. The same applies to cyberattack; when someone hacks into a system and take control of it, there will be unauthorized access to sensitive information, which makes the critical infrastructure risky.

1 Answer

3 votes

Answer:

In the event of a physical attack, such as vandalism or destruction of critical infrastructure components, the functioning of the public telephone network and wireless satellite networks could be disrupted, leading to communication breakdowns and potential threats to national security.

Similarly, a cyber event, such as a cyberattack on the telecommunication networks, could result in data breaches, system compromises, and service disruptions. A cyberattack could be aimed at disrupting communication services, gaining unauthorized access to sensitive information, or carrying out Distributed Denial of Service (DDoS) attacks, affecting the critical infrastructure's functionality and reliability.

Furthermore, a natural disaster like an earthquake, hurricane, or flooding can cause physical damage to communication infrastructure, including cell towers, satellite ground stations, and data centers. This damage can lead to service outages and hamper communication capabilities, hindering emergency response efforts and potentially impacting public safety.

In all these scenarios, the critical infrastructure's resiliency and preparedness to handle such events become crucial. Implementing robust security measures, redundancies, and disaster recovery plans can help mitigate the impact of physical attacks, cyber events, or natural disasters on critical assets and ensure the continuity of essential services. Regular testing and updating of contingency plans are essential to protect and secure critical infrastructure from potential threats.

User Wesley Egbertsen
by
7.9k points