Page 11 - Cyber Terrorism and Extremism as Threat to Critical Infrastructure Protection
P. 11

tions. Thus, the larger and more critical the asset, the likely degree of dependence on infor-
            mation technology—and thus the greater degree of risk from cyber-hackers.

            The three protection priorities—human, physical and cyber—can be dealt with individually
            to identify and reduce vulnerabilities and consequences. Physical measures such as barri-
            ers, ballistic curtains, bollards, armed guards, etc. are easy, albeit expensive methods for
            protecting human and physical assets. However, cyber protection has as many solutions as
            the number of experts discussing it.

            Since 9/11 and the ever-expanding capabilities of today’s cyber world, damage and destruc-
            tion efforts are focusing more on cyber-attacks than physical attacks—particularly if the
            site depends on and shares data with a large number of stakeholders. What this portends for
            owners and stakeholders is a more internal versus external focus on protection—the per-
            sonnel having access to the cyber systems that support and facilitate day-to-day operations.
            Respect the capabilities of potential adversaries. Strengthen personal surety and Red Team
            systems—physical measures are limited.



                                                                Tampa, September 2020
                                                                James F. Powers Jr.













































                                                                                     11
   6   7   8   9   10   11   12   13   14   15   16