Critical Infrastructure
Q1. Threats Related To Landlines, Cell Phones, and Satellite Communications
Possible risks involved in installing these types of communication include natural, human-made and technological threats. Natural hazards such as floods and hurricanes would interfere with landline communication as the hard wires used might be cut off by strong winds. If wiring is underground, disasters such as floods could interfere with communication, possibly damaging the cables. Cell phone communication might be interrupted by extreme weather, but there is no likelihood of permanent damage. On the other hand, satellite communication is least likely to be affected by natural disasters. Physical threats include cellular phone theft or cutting off of landline wires. Physical risk is not expected with satellite communication. Cyber threats are not likely with landline communication but are high risk with satellite and cellular connection due to hacking. Therefore it would be possible to intercept any activity coming in and out of the company.
Q2. One Way That a Criminal or Terrorist Might Attack Critical Infrastructure in the Community
A cyber attack is possible and could be targeted at the health care infrastructure. Hacking can be done remotely, making it easier to breach a hospital system by interfering with equipment function. Ventilators, imaging machines, records, to name a few, would be manipulated, placing patient lives at risk. For example, a network breach affecting ventilators would result in loss of life or brain damage. Mitigation against cyber attacks would be essential and would include; use of software that is not susceptible to a viral risk. Password authentication would also be necessary to reduce the possibility of access to the hospital network system. Access restriction to the hospital records and facility is also vital. In case of a breach, a reboot system would be installed to reactivate the network within the shortest time possible, overriding the hack mechanism such as malware.
Q3. Difference between Risk and Vulnerability
Risk identification is essential (American Society of Safety Professionals, 2019) as it involves danger or harm exposed to people or infrastructure that could cause damage. Vulnerability refers to the likelihood of the identified hazard occurring and the level of damage likely to happen (IFRC, 2020). For example, for an organization dealing with surveillance equipment, the risks involved could include theft, technological attacks such as hacking and property and asset damage due to natural disasters such as floods. The impact may not put employees at high risk in case of a cyber-attack but would affect equipment if a natural accident occurred, leading to huge losses. Whereas the risk includes flooding, cyber attack, and burglary, the vulnerability involves exposure level to the identified threats. A natural disaster and cyber attack could be more likely than a facility break in making the organization more vulnerable to the former.
References
American Society of Safety Professionals. (2019). Conducting a risk assessment. American
Society of Safety Professionals. Retrieved 24 June 2020, from https://www.assp.org/news-and-articles/2019/02/12/conducting-a-risk-assessment.
IFRC. (2020). What is vulnerability? – IFRC. Ifrc.org. Retrieved 24 June 2020, from
https://www.ifrc.org/en/what-we-do/disaster-management/about-disasters/what-is-a-disaster/what-is-vulnerability/.