skip to main content
research-article

What needs to be done: protecting critical infrastructure: second prize: 2007 Schubmehl-Prein Essay contest

Published:01 March 2008Publication History
Skip Abstract Section

Abstract

It begins as a regular day in March of 1997, but by 9:00 a.m. all communications are down at the Worcester Airport in Massachusetts (Rindskopf). Telephone service at the airport and its fire department are cut off without warning. Six hours later all telephone service has been disabled in the entire surrounding area. Emergency services are jeopardized as the city's residents have lost the means to make calls for help, putting the health and safety of the public at risk. The airplanes have lost the means to coordinate landings and takeoffs at the airport, creating delays across the nation. In the span of a few hours, a juvenile computer hacker has single-handedly disrupted several sectors of the nation's critical infrastructure using only his personal computer as an aid (Rindskopf). This is just one of the thousands of instances in the past decade in which a cyber security breach has jeopardized the critical infrastructure of this nation.

References

  1. "Critical Infrastructure Protection Program (CIPP)." George Mason University. 1 Dec. 2006. 27 May 2007 <http://cipp.gmu.edu/cip/>.Google ScholarGoogle Scholar
  2. Department of Homeland Security. Fact Sheet: Protecting America's Critical Infrastructure - Cyber Security. 15 Feb. 2005. 28 May 2007 <http://www.dhs.gov/xnews/releases/press_release_0620.shtm>.Google ScholarGoogle Scholar
  3. Department of Homeland Security. National Strategy for Homeland Security. July 2002. 29 May 2007 <http://www.whitehouse.gov/homeland/book/sect3-3.pdf>.Google ScholarGoogle Scholar
  4. Gorge, Mathieu. "Cyberterrorism: Hype or Reality?" Computer Fraud & Security< 2 (2007): 9--12.Google ScholarGoogle ScholarCross RefCross Ref
  5. Office of Electricity Delivery and Energy Reliability. U.S. Department of Energy. Resists Attack. Jan. 2007. 29 May 2007 <http://www.netl.doe.gov/moderngrid/docs/Resists%20Attack_Final%20_v2_0.pdf>.Google ScholarGoogle Scholar
  6. President's Critical Infrastructure Protection Board. Department of Homeland Security. National Strategy to Secure Cyberspace. 18 Sept. 2002. 28 May 2007 <http://www.whitehouse.gov/pcipb/priority_3.pdf>.Google ScholarGoogle Scholar
  7. Rindskopf, Amy. Department of Justice. Juvenile Computer Hacker Cuts Off FAA Tower At Regional Airport. 18 Mar. 1998. 30 May 2007 <http://www.cybercrime.gov/juvenilepld.htm>.Google ScholarGoogle Scholar
  8. Schneier, Bruce. "Crypto-Gram Newsletter: National Strategy to Secure Cyberspace." Schneier. 15 Oct. 2002. 29 May 2007 <http://www.schneier.com/crypto-gram-0210.html>.Google ScholarGoogle Scholar
  9. Wagner, Cynthia G. "Countering Cyber Attacks." World Trends & Forecasts< May-June 2007. 27 May 2007 <https://www.wfs.org/trend3mj07.htm>.Google ScholarGoogle Scholar

Index Terms

  1. What needs to be done: protecting critical infrastructure: second prize: 2007 Schubmehl-Prein Essay contest

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM SIGCAS Computers and Society
        ACM SIGCAS Computers and Society  Volume 38, Issue 1
        March 2008
        42 pages
        ISSN:0095-2737
        DOI:10.1145/1361255
        Issue’s Table of Contents

        Copyright © 2008 Author

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 March 2008

        Check for updates

        Qualifiers

        • research-article
      • Article Metrics

        • Downloads (Last 12 months)1
        • Downloads (Last 6 weeks)0

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader