Free Essay SamplesAbout UsContact Us Order Now

Infrastructure Protection

0 / 5. 0

Words: 275

Pages: 1

57

CYBER-ATTACK IN AUSTRALIA.
Name
Course
Professor
University Details
Date of Submission.
1. Do you believe that the nightmare scenario of a foreign adversary shutting down the power, turning off banking systems or physically damaging crucial infrastructure will happen to Australia? Give reasons for your opinion.
Australian systems are interconnected (Schiller, 2010, 6). A SCADA runs the systems. Normally SCADA do not have cybersecurity. The systems connect to the internet and the messages of the system are not accurate. Hence it is very difficult to determine whether the person sending a command is legit, or a hacker is trying to get into the system (Zetter, 2016, 14). This makes it easier for an outsider to get into the system without being noticed. Therefore a hacker would easily get in and manipulate all the activities and damages the crucial infrastructure in the system. The above reasons, therefore, validate the possibility of a cyber-attack happening in Australia.
2. If such an event occurred and resulted in the loss of civilian life, is this a red line that would justify military retaliation or still within the limits of a diplomatic option?
In case a Cyber-attack occurs in Australia, which would lead to shutting down of power, the country would face the lack of electricity, which is one of the worst events that should never occur (Harrop & Matteson, 2015, 149). It would affect almost all activities in a country. Also, it would affect the transport system; this would then lead to a halt in food distribution, water distribution and also would affect the distribution of emergency treatment.

Wait! Infrastructure Protection paper is just an example!

Therefore, if the attack would happen, and the problem would not be solved immediately, then civil disturbances are likely to rise, and this would result into the loss of lives.
3. What are some of the main hindrances to securing SCADA systems?
Schiller (2010) advocates that in most cases, SCADA systems lack cybersecurity. These systems are not easy to secure; since they are always not easy to change old forms just because of being afraid of risks that would cause instability. Overcoming this challenge, requires observing the configuration that would ensure the new adjustments to the system would guarantee total security. Hence the SCADA would be secured.
ReferencesHarrop, W. and Matteson, A., 2015. Cyber resilience: A review of critical national infrastructure and cyber-security protection measures applied in the UK and USA. In Current and Emerging Trends in Cyber Operations (pp. 149-166). Palgrave Macmillan, London. (https://www.thalesgroup.com/sites/default/files/asset/document/thales-critical-national-infrastructure-the-threat-landscape.pdf)
Zetter, K., 2016. Inside the cunning, unprecedented hack of Ukraine’s power grid. Wired. (https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/)
Schiller, J., 2010. Cyber attacks & protection: civilization depends on Internet & email. CreateSpace. (http://www.abc.net.au/catalyst/stories/3780304.htm)

Get quality help now

Mike O’Sullivan

5.0 (278 reviews)

Recent reviews about this Writer

Thanks to StudyZoomer, I managed to boost my grades in Marketing which used to be a challenging discipline with a lot of writing assignments. Highly recommend this company and its writers!

View profile

Related Essays

Cyberattack Brief

Pages: 1

(275 words)

Expansion

Pages: 1

(275 words)

BlackfishReading Response

Pages: 1

(275 words)

Rhetorical Analysis

Pages: 1

(275 words)

Might Have Been an Inside Job

Pages: 1

(275 words)

Breach Operation Aurora

Pages: 1

(275 words)

transactional crime(s)

Pages: 1

(275 words)

Patriot Act

Pages: 1

(275 words)