This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Critical Infrastructure

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Critical Infrastructure

Q1. Threats Related To Landlines, Cell Phones, and Satellite Communications

Possible risks involved in installing these types of communication include natural, human-made and technological threats. Natural hazards such as floods and hurricanes would interfere with landline communication as the hard wires used might be cut off by strong winds. If wiring is underground, disasters such as floods could interfere with communication, possibly damaging the cables. Cell phone communication might be interrupted by extreme weather, but there is no likelihood of permanent damage. On the other hand, satellite communication is least likely to be affected by natural disasters. Physical threats include cellular phone theft or cutting off of landline wires. Physical risk is not expected with satellite communication.  Cyber threats are not likely with landline communication but are high risk with satellite and cellular connection due to hacking. Therefore it would be possible to intercept any activity coming in and out of the company.

Q2. One Way That a Criminal or Terrorist Might Attack Critical Infrastructure in the Community

A cyber attack is possible and could be targeted at the health care infrastructure. Hacking can be done remotely, making it easier to breach a hospital system by interfering with equipment function. Ventilators, imaging machines, records, to name a few, would be manipulated, placing patient lives at risk. For example, a network breach affecting ventilators would result in loss of life or brain damage. Mitigation against cyber attacks would be essential and would include; use of software that is not susceptible to a viral risk. Password authentication would also be necessary to reduce the possibility of access to the hospital network system. Access restriction to the hospital records and facility is also vital. In case of a breach, a reboot system would be installed to reactivate the network within the shortest time possible, overriding the hack mechanism such as malware.

Q3. Difference between Risk and Vulnerability

Risk identification is essential (American Society of Safety Professionals, 2019) as it involves danger or harm exposed to people or infrastructure that could cause damage. Vulnerability refers to the likelihood of the identified hazard occurring and the level of damage likely to happen (IFRC, 2020). For example, for an organization dealing with surveillance equipment, the risks involved could include theft, technological attacks such as hacking and property and asset damage due to natural disasters such as floods. The impact may not put employees at high risk in case of a cyber-attack but would affect equipment if a natural accident occurred, leading to huge losses. Whereas the risk includes flooding, cyber attack, and burglary, the vulnerability involves exposure level to the identified threats. A natural disaster and cyber attack could be more likely than a facility break in making the organization more vulnerable to the former.

 

 

 

 

 

 

References

American Society of Safety Professionals. (2019). Conducting a risk assessment. American

Society of Safety Professionals. Retrieved 24 June 2020, from https://www.assp.org/news-and-articles/2019/02/12/conducting-a-risk-assessment.

IFRC. (2020). What is vulnerability? – IFRC. Ifrc.org. Retrieved 24 June 2020, from

https://www.ifrc.org/en/what-we-do/disaster-management/about-disasters/what-is-a-disaster/what-is-vulnerability/.

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask