{"id":112275,"date":"2021-06-15T10:42:31","date_gmt":"2021-06-15T05:12:31","guid":{"rendered":"https:\/\/blog.forumias.com\/?p=112275"},"modified":"2021-06-15T12:34:22","modified_gmt":"2021-06-15T07:04:22","slug":"need-of-strengthening-cyber-resilience-of-civilian-infrastructure","status":"publish","type":"post","link":"https:\/\/forumias.com\/blog\/need-of-strengthening-cyber-resilience-of-civilian-infrastructure\/","title":{"rendered":"Need of Strengthening Cyber Resilience of Civilian infrastructure"},"content":{"rendered":"\n<p><strong>Synopsis: <\/strong><a href=\"https:\/\/forumias.com\/blog\/cyber-attacks-on-critical-infrastructure\/\" target=\"_blank\" rel=\"noopener\">Cyber-attacks<\/a> are increasing on civilian targets and infrastructure around the globe. Thus, there is a critical need to strengthen the<span style=\"color: #000000;\"> <a style=\"color: #000000;\" href=\"https:\/\/forumias.com\/blog\/need-of-strengthening-cyber-resilience-of-civilian-infrastructure\/\">Cyber resilience of civilian infrastructure<\/a>.<\/span><\/p>\n<h5><strong>Background<\/strong><\/h5>\n<ul>\n<li>Cyber, which is regarded as the fifth dimension of warfare, is now largely being employed against civilian targets.<\/li>\n<li>For instance, several high-profile cyberattacks were reported from the United States during the past several months.<\/li>\n<li>These attacks were all primarily on civilian targets that were of critical importance.<\/li>\n<li>Hence, there is a need to defending civilian targets, and more so critical infrastructure, against cyberattacks such as ransomware, phishing, spear phishing, Zero-day software, etc.,<\/li>\n<\/ul>\n<p><strong>\u00a0<\/strong><strong>Recent cyberattacks on Civilian infrastructure reported from the United States<\/strong><\/p>\n<ol>\n<li><strong>SolarWinds: <\/strong>It was believed to be sponsored by Russia. It involved data breaches across several wings of the U.S. government, including defence, energy, and state.<\/li>\n<li><strong>Hafnium: <\/strong>Aggressive cyberattack, by a Chinese group. It exploited serious flaws in Microsoft\u2019s software.<\/li>\n<li><strong>DarkSide: <\/strong>Ransomware attack by Russia\/East Europe-based cybercriminals<strong>. <\/strong>Attacked the Colonial Pipeline, the main supplier of oil to the U.S. East Coast, compelling the company to temporarily shut down operations.<\/li>\n<li><strong>Nobellium<\/strong>: Russia-backed group. A phishing attack on 3,000 e-mail accounts, targeting USAID and several other organisations.<\/li>\n<\/ol>\n<p><strong style=\"font-family: var(--heading--font-family); font-size: var(--heading--font-size-h5); letter-spacing: var(--heading--letter-spacing-h5); background-color: var(--global--color-background); color: var(--global--color-primary);\"><br \/>\nPossible motives behind Cyberattacks<\/strong><\/p>\n<p>Data has become the world\u2019s most precious commodity and reportedly, we create more than three quintillion bytes of data every day. \u00a0With the growth in the digital world, attacks on data and data systems are bound to intensify for various following reasons,<\/p>\n<ul>\n<li>One, for nation-states involved in Cyber-attacks, their primary aim is to transform the existing Geopolitical situation in their favor.<\/li>\n<li>Two, for cybercriminals and for terror groups, the motive is to earn increased profits.<\/li>\n<li>Three, some companies encounter \u2018insider threats\u2019 \u00a0due to discontent with the management or for personal reasons.<\/li>\n<\/ul>\n<h5><strong>Why the cyber resilience of Civilian infrastructure needs to be strengthened?<\/strong><\/h5>\n<p>Nations around the globe are concentrating on cyber defences to protect military and strategic targets, whereas the priority to protect civilian infrastructure is being overlooked. This needs to be changed for the following reasons.<\/p>\n<ul>\n<li><strong>One<\/strong>, the use of \u2018Zero-day software\u2019 that earlier existed only for the military domain now exists outside the military domain too.\n<ul>\n<li>A zero-day attack (also referred to as Day Zero) is an attack that exploits a potentially serious software security weakness that the vendor or developer may be unaware of.<\/li>\n<li>It has the capability to cripple a system and could lie undetected for a long time. The most infamous Zero-day software is <strong>Stuxnet.<\/strong> It almost crippled Iran\u2019s uranium enrichment Programme.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Two,<\/strong> the distinction between military and civilian targets is increasingly getting erased. For instance, the 2012 cyberattack on Aramco, employing the <strong>Shamoon virus,<\/strong> had wiped out the memories of 30,000 computers of the Saudi Aramco Oil Corporation.<\/li>\n<li><strong>Three<\/strong>, cyberattacks on unconventional sectors have increased. For instance, Banking and financial services were most prone to ransomware attacks, but oil, electricity grids, and lately, health care, have begun to figure prominently.<\/li>\n<li><strong>Four<\/strong>, the number of cyberattacks on healthcare systems is increasing. Compromised \u2018health information\u2019 is proving to be a vital commodity for use by cybercriminals. The available data aggravates the risk not only to the individual but also to entire communities.<\/li>\n<\/ul>\n<h5><strong>What needs to be done?<\/strong><\/h5>\n<p>Already, Cyber professionals are now engaged in building a \u2018Zero Trust-Based Environment\u2019 by employing software-defined solutions.\u00a0 However, much needed to be done<\/p>\n<p><strong>Read Also :-<a class=\"seoquake-params-link\" href=\"https:\/\/forumias.com\/blog\/cyber-attacks-on-critical-infrastructure\/\" rel=\"1858e35d x_url\">Cyber Attacks on critical Infrastructure<\/a><\/strong><\/p>\n<ul>\n<li>One needs to build deep technology in cyberspace. New technologies such as <a href=\"https:\/\/forumias.com\/blog\/potential-of-artificial-intelligenceai\/\">artificial intelligence<\/a>, Machine learning, and quantum computing, presents new opportunities in this regard.<\/li>\n<li>Two, officials in the public domain and company boards should carry out regular vulnerability assessments and create necessary awareness of the growing cyber threat.<\/li>\n<\/ul>\n<p><strong>Source:\u00a0 <a href=\"https:\/\/epaper.thehindu.com\/Home\/ShareArticle?OrgId=GE98LRS3U.1&amp;imageview=0\">The Hindu<\/a><\/strong><\/p>\n<p><strong>More Related Articles :<\/strong><\/p>\n<table style=\"border-collapse: collapse; width: 98.1507%;\">\n<tbody>\n<tr id=\"row_id_7\" class=\" activeDarkBlue\">\n<td style=\"width: 30.3991%;\"><span style=\"color: #333399;\"><strong><a style=\"color: #333399;\" href=\"https:\/\/forumias.com\/blog\/energy-flow-in-ecosystem\/\" target=\"_blank\" rel=\"noopener\">Energy flow in ecosystem<\/a><\/strong><\/span><\/td>\n<td style=\"width: 36.156%;\"><span style=\"color: #333399;\"><strong><a style=\"color: #333399;\" href=\"https:\/\/forumias.com\/blog\/amrabad-tiger-reserve\/\" target=\"_blank\" rel=\"noopener\">Amrabad tiger reserve<\/a><\/strong><\/span><\/td>\n<td style=\"width: 33.5458%;\"><span style=\"color: #333399;\"><strong><a style=\"color: #333399;\" href=\"https:\/\/forumias.com\/blog\/answered-what-is-red-tapism-discuss-its-consequences-and-suggest-some-measures-to-reduce-it\/\" target=\"_blank\" rel=\"noopener\">Red tapism<\/a><\/strong><\/span><\/td>\n<\/tr>\n<tr id=\"row_id_54\" class=\" activeDarkBlue\">\n<td style=\"width: 30.3991%;\"><span style=\"color: #333399;\"><strong><a style=\"color: #333399;\" href=\"https:\/\/forumias.com\/blog\/indigo-cultivation-in-india-declined-by-the-beginning-of-the-20th-century\/\" target=\"_blank\" rel=\"noopener\">Indigo cultivation<\/a><\/strong><\/span><\/td>\n<td style=\"width: 36.156%;\"><span style=\"color: #333399;\"><strong><a style=\"color: #333399;\" href=\"https:\/\/forumias.com\/blog\/financial-year-india-rbi\/\" target=\"_blank\" rel=\"noopener\">Financial year india rbi<\/a><\/strong><\/span><\/td>\n<td style=\"width: 33.5458%;\"><span style=\"color: #333399;\"><strong><a style=\"color: #333399;\" href=\"https:\/\/forumias.com\/blog\/what-is-the-ken-betwa-link-project\/\" target=\"_blank\" rel=\"noopener\">ken betwa link project<\/a><\/strong><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Synopsis: Cyber-attacks are increasing on civilian targets and infrastructure around the globe. Thus, there is a critical need to strengthen the Cyber resilience of civilian infrastructure. Background Cyber, which is regarded as the fifth dimension of warfare, is now largely being employed against civilian targets. For instance, several high-profile cyberattacks were reported from the United&hellip; <a class=\"more-link\" href=\"https:\/\/forumias.com\/blog\/need-of-strengthening-cyber-resilience-of-civilian-infrastructure\/\">Continue reading <span class=\"screen-reader-text\">Need of Strengthening Cyber Resilience of Civilian infrastructure<\/span><\/a><\/p>\n","protected":false},"author":61,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"categories":[1230,9],"tags":[1361],"class_list":["post-112275","post","type-post","status-publish","format-standard","hentry","category-9-pm-daily-articles","category-public","tag-sec_4","entry"],"jetpack_featured_media_url":"","views":{"total":0,"cached_at":"","cached_date":1704817356},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts\/112275","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/users\/61"}],"replies":[{"embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/comments?post=112275"}],"version-history":[{"count":0,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts\/112275\/revisions"}],"wp:attachment":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/media?parent=112275"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/categories?post=112275"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/tags?post=112275"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}