Abstract
It begins as a regular day in March of 1997, but by 9:00 a.m. all communications are down at the Worcester Airport in Massachusetts (Rindskopf). Telephone service at the airport and its fire department are cut off without warning. Six hours later all telephone service has been disabled in the entire surrounding area. Emergency services are jeopardized as the city's residents have lost the means to make calls for help, putting the health and safety of the public at risk. The airplanes have lost the means to coordinate landings and takeoffs at the airport, creating delays across the nation. In the span of a few hours, a juvenile computer hacker has single-handedly disrupted several sectors of the nation's critical infrastructure using only his personal computer as an aid (Rindskopf). This is just one of the thousands of instances in the past decade in which a cyber security breach has jeopardized the critical infrastructure of this nation.
- "Critical Infrastructure Protection Program (CIPP)."
George Mason University . 1 Dec. 2006. 27 May 2007 <http://cipp.gmu.edu/cip/>.Google Scholar - Department of Homeland Security.
Fact Sheet: Protecting America's Critical Infrastructure - Cyber Security . 15 Feb. 2005. 28 May 2007 <http://www.dhs.gov/xnews/releases/press_release_0620.shtm>.Google Scholar - Department of Homeland Security.
National Strategy for Homeland Security . July 2002. 29 May 2007 <http://www.whitehouse.gov/homeland/book/sect3-3.pdf>.Google Scholar - Gorge, Mathieu. "Cyberterrorism: Hype or Reality?"
Computer Fraud & Security< 2 (2007): 9--12.Google ScholarCross Ref - Office of Electricity Delivery and Energy Reliability. U.S. Department of Energy.
Resists Attack . Jan. 2007. 29 May 2007 <http://www.netl.doe.gov/moderngrid/docs/Resists%20Attack_Final%20_v2_0.pdf>.Google Scholar - President's Critical Infrastructure Protection Board. Department of Homeland Security.
National Strategy to Secure Cyberspace . 18 Sept. 2002. 28 May 2007 <http://www.whitehouse.gov/pcipb/priority_3.pdf>.Google Scholar - Rindskopf, Amy. Department of Justice.
Juvenile Computer Hacker Cuts Off FAA Tower At Regional Airport . 18 Mar. 1998. 30 May 2007 <http://www.cybercrime.gov/juvenilepld.htm>.Google Scholar - Schneier, Bruce. "Crypto-Gram Newsletter: National Strategy to Secure Cyberspace."
Schneier . 15 Oct. 2002. 29 May 2007 <http://www.schneier.com/crypto-gram-0210.html>.Google Scholar - Wagner, Cynthia G. "Countering Cyber Attacks."
World Trends & Forecasts< May-June 2007. 27 May 2007 <https://www.wfs.org/trend3mj07.htm>.Google Scholar
Index Terms
- What needs to be done: protecting critical infrastructure: second prize: 2007 Schubmehl-Prein Essay contest
Recommendations
Protecting critical infrastructure: implementing integration and expanding education: first prize: 2007 Schubmehl-Prein Essay contest
The tenuous network of interconnected data that supports our nation's critical infrastructure has been built up, computer by computer, over only the last few decades. From punch cards to the supercomputers constructed by pioneers in today's fields, ...
Critical infrastructure dependencies
The proper functioning of critical infrastructures is crucial to societal well-being. However, critical infrastructures are not isolated, but instead are tightly coupled, creating a complex system of interconnected infrastructures. Dependencies between ...
Defending Critical Infrastructure
We apply new bilevel and trilevel optimization models to make critical infrastructure more resilient against terrorist attacks. Each model features an intelligent attacker (terrorists) and a defender (us), information transparency, and sequential ...
Comments