Page 11 - Cyber Terrorism and Extremism as Threat to Critical Infrastructure Protection
P. 11
tions. Thus, the larger and more critical the asset, the likely degree of dependence on infor-
mation technology—and thus the greater degree of risk from cyber-hackers.
The three protection priorities—human, physical and cyber—can be dealt with individually
to identify and reduce vulnerabilities and consequences. Physical measures such as barri-
ers, ballistic curtains, bollards, armed guards, etc. are easy, albeit expensive methods for
protecting human and physical assets. However, cyber protection has as many solutions as
the number of experts discussing it.
Since 9/11 and the ever-expanding capabilities of today’s cyber world, damage and destruc-
tion efforts are focusing more on cyber-attacks than physical attacks—particularly if the
site depends on and shares data with a large number of stakeholders. What this portends for
owners and stakeholders is a more internal versus external focus on protection—the per-
sonnel having access to the cyber systems that support and facilitate day-to-day operations.
Respect the capabilities of potential adversaries. Strengthen personal surety and Red Team
systems—physical measures are limited.
Tampa, September 2020
James F. Powers Jr.
11