Critical infrastructure sectors are considered vital to the functioning of modern societies and economies to the point that their incapacitation or destruction would have a debilitating and cascading effect; yet these systems are vulnerable to damage as a result of natural disaster, physical incidents or cyber attacks. Vulnerabilities continued to plague industrial control systems (ICS) and supervisory control and data acquisition systems (SCADA) in 2015, impacting on critical infrastructure organisations managing complex IT and physical networks 100.
Malicious code can potentially be used to manipulate the controls of power grids, financial services, energy providers, defence, healthcare databases and other critical infrastructure, resulting in real-world catastrophic physical damage, such as blackouts or disruptions to an entire city's water supply101,102.
In most of the reported or analysed attacks targeting ICS, the initial infection began with targeted spear phishing and a malware drop to attack the network. In such a scenario, ICS-focused protection alone proved unable to prevent cyber attacks. Relying only on detection is not enough - the key to success in securing ICS is prevention. However, there is a need to strike a balance between adding sensors to the network and the risk to be overwhelmed with alarms, alerts and indicators103.
With securing critical infrastructure becoming a priority, a holistic approach is required where vulnerabilities and threats to the physical security and the security of ICT must be managed and controlled in the context of a comprehensive risk management framework, considering all interconnections and dependencies, and taking into account a total stakeholder view.