Page 140 - Cyber Terrorism and Extremism as Threat to Critical Infrastructure Protection
P. 140

SECTION II:  CYBER TERRORISM AND SECURITY IMPLICATION FOR CRITICAL INFRASTRUCTURE PROTECTION

        The current trends in the realm of cybersecurity, as evidenced by numerous studies in the field,
        for example Coburn et al. (2019) and O’Gorman et al. (2019), show that there is an increase
        in cybercrime that specifically targets critical infrastructure. Firstly, we have the exceptional
        growth in supply chain attacks through specific means – 78% from 2017 to 2018 (O’Gorman
        et al., 2019). Secondly, we have the various sector-based analyses which show that energy,
        transport, public administration, finance and others are key targets for cyberattacks, either
        motivated by profit, by ideology or by politics (Coburn et al., 2019).

        At the same time, we are witnessing the potentially uncontrolled proliferation of cyber weap-
        ons and the possibility of their modification to suit particular needs (Georgescu et al, 2019).
        Even without the loss of state-sponsored cyber weapons, we are also witnessing a disconnect
        between attacker and skill set. Previously, the attacker would need a specific skill set and
        knowledge to succeed. Today, the commodification of malware and the mirroring of legiti-
        mate business processes, such as the ability to purchase hacking services, DDoS attacks and
        so on, has resulted in a wider range of potential attackers, “democratizing” cyber disruption,
        whether coming from rivals, professional criminals, activists or even terrorists (Georgescu,
        2018).

        Every piece of critical infrastructure in an advanced nation is controlled partly or completely
        through networked systems that enable specific functionalities and efficiencies involving data
        management, feedback loops, information gathering and processing and coordination. Every
        developing nation desires an infrastructure profile that ultimately increases the permeation
        of their critical infrastructures by cyber. This means that exposure to cyber risks is growing
        simultaneously with the growth in the number of attackers, their means and their potential
        rewards from attacks.

        These trends are exacerbated by paradigm shifts such as the Internet-of-Things with billions
        of devices and sensors, ubiquitous computing, artificial intelligence and, least remarked of
        all, the growth in the use of commercial-off-the-shelf solutions for complex and vulnerable
        systems, such as industrial control systems and SCADA (Georgescu & Cîrnu, 2019). More
        and more, even military technology and satellites (Falco, 2018) are based on commercial-
        off-the-shelf technologies and software. Whereas previously a SCADA system would feature
        proprietary equipment and software, dedicated communication lines and other advantages
        that offered it “security by opacity” from attackers, today these systems and others rely on
        internet connectivity, commercial sensors and equipment, and commercial software (Nazir
        et al., 2017). This evolution was motivated by mounting costs and the desire to enable new
        functionalities and efficiencies, but has resulted in this particular vulnerability. These evolu-
        tions effectively applied the logic of fast replacing consumer goods and electronics to durable
        goods and, increasingly, to complex systems whose lifespan is measured in decades. The
        profusion of unpatched and unpatchable devices results in long-term vulnerabilities which
        are inherent in the system until it is upgraded, a complex process which often results in the
        layering of different generations of control systems in a way which may result in emergent
        behaviours and new, non-deliberate threats, while also possibly giving rise to system exploits
        which may be used by adversaries.

        In conclusion, the cyber dimension of critical infrastructure has generated a persistent and
        evolving security problem which facilitates terrorism and other forms of deliberate disruption,
        and which must be addressed through systemic resilience.



       140
   135   136   137   138   139   140   141   142   143   144   145