infrastructure security

What Is Infrastructure Security?

Infrastructure security relates to the provision of security services to safeguard organisational structures and facilities. The goal is to limit the exposure of systems and structures to threats and risks of sabotage, terrorism, and contaminations. Hence, infrastructure security experts maintain it is at the root of corporate security plans. 

Although the elements vary to some extent on the country or business in question, it involves specific procedures, policies, and techniques that aim to protect so-called critical infrastructure such as: 

  • airports, 
  • highways, 
  • rail transport, 
  • hospitals, 
  • bridges, 
  • transport hubs, 
  • network communications, 
  • media, 
  • the electricity grid, 
  • dams, 
  • power plants, 
  • seaports, 
  • oil refineries, and  
  • water systems. 

Due to technological advancements, these infrastructures have become highly interconnected and interdependent; and heavily reliant on IT. In turn, this has made them more vulnerable to intrusions and disruptions.  

Most significantly, since disruptions in one infrastructure can adversely affect and provoke failures in another, their security has become a key concern. 

Potential Threats to Infrastructure Security 

Since critical infrastructure is vital for countries and organisations to function properly, damage can seriously impact the economy and the provision of services. There are several intentional and unintentional risks from which infrastructure needs to be heavily secured and protected:  

Terrorism – the deliberate targeting of critical infrastructure for political gain.  

Theft – breaking into sites, like electrical substations, to steal materials or equipment. 

Sabotage – this includes the activities of competitors, ex-employees, or political groups against organisations or governments. 

Cyber-attack – hacking to gain information or damage national or company infrastructure.  

Natural disaster – hurricane or natural events that damage oil pipelines, water supply, and power grids.  

Global Trends of Attacks on Critical Infrastructure  

In December 2015, the BlackEnergy malware hit three utility companies in Ukraine. In its wake, hundreds of thousands of people were left without electricity and the world witnessed the first known power outage caused by a malicious attack by hackers. 

Since then, the energy sector has remained a favourite target for cyber-attacks. However, these attacks are not limited or isolated to that one industry. In fact, transport, public sector services, and telecommunications also present appealing targets. 

In 2013, a group of hackers from Iran breached the Bowman Avenue Damn in New York, USA, gaining control of the floodgates. That same year, damage caused by a sniper attack at an electrical substation in California threatened power distribution throughout Silicon Valley.  

More recently, the 2020 car bombing in Nashville, Tennessee, injured three people and destroyed a section of the city’s downtown region, causing significant damage to a key AT&T transmission facility. As a result, wired networks were brought down across parts of Tennessee, Kentucky, and Alabama, and briefly grounding flights.  

Critical Infrastructure in Australia 

PwC survey from late 2020 warns of an increased risk of cyber-attacks targeting local, critical infrastructure. Business leaders are expecting more cyber-attacks in the next 12 months than their global peers. Reportedly, 56% of Australian executives anticipate attacks on the nation’s critical infrastructure which could shut down vital services such as hospitals.  

According to everything we have seen so far, those fears appear to be well-founded. 

infrastructure security

Eastern Health Attack 

One of Melbourne’s largest metropolitan public health services, Eastern Health, had to postpone several elective surgery procedures following a cyber-attack. Even though patient safety was not compromised, the category two and three elective surgery procedures were postponed. 

Western Australia’s parliamentary email network 

Earlier in March 2021, Western Australia’s parliamentary email network was hit by hackers as part of a massive global cyber-attack involving Microsoft software. The cyber-attack was detected in the middle of the state election campaign, with the hack affecting thousands of Australian servers. 

False Claims of COVID-19 cases on ANU campus 

Staff at the Australian National University (ANU) received a scam email, falsely claiming that the Canberra campus recorded COVID-19 cases. In fact, multiple members of different departments at the university reported receiving the email, including a link that the reader was advised to follow. 

This institution had also fallen prey to a 2018 attack, when hackers infiltrated the university’s systems, sparking a months-long process to shut the attack down. 

Tamim Khaja Plot 

Sadly, cyber-attacks seem just to be the tip of the iceberg against critical infrastructure in Australia. Similarly, endangering the proper functioning of society, terrorist attacks and plots can be equally deadly.  

In 2018, 20-year-old man Tamim Khaja was sentenced to 19 years in jail. He pleaded guilty to planning and preparing a so-called lone-wolf terrorist attack in Sydney. 

In fact, he intended to target the Timor Army Barracks and Sydney West Trial Courts. Claiming to derive his inspiration from the Charlie Hebdo terror attack in Paris, Tamim Khaja hoped to encourage others to perform similar acts. 

Conclusively, NSW Supreme Court Justice Desmond Fagan said of the case: “He expected his actions would encourage others of the same mind to undertake similar atrocities leading to police and security services being overwhelmed, the institutions of democratic government being weakened, and the Australian people being forced to live under Islamic law, sharia.” 

Infrastructure Security and Risk Management 

Infrastructure security risks are unique to sectors within a particular industry.  

Organisations within the healthcare industry most often face breaches to patient records security, or worse, harm to the patients. Conversely, chemical companies are vulnerable to terrorists releasing hazardous chemicals. Due to this, mitigation strategies should also be unique and adaptable to the evolving threats. 

In terms of infrastructure security, the risk management strategy involves five main functions: 

Planning – Being prepared means staying watchful and having clear guidelines on how to properly identify, assess, and avoid risk. Despite many of these risks often being difficult or impossible to predict, having a plan goes a long way when disaster strikes.  

Prevention – Risk is often thought to lead to the greatest benefits. However, this does not hold true for infrastructure security. Potential harm will always outweigh probable benefits, and because of this prevention and avoidance policies are best practices. 

Quick Response and Operational Efficiency – A high level of operational efficiency is essential to critical infrastructure security. In turn, this facilitates quick response when a disaster or security breach occurs. 

Disaster Recovery – This involves measures taken to maintain operations during a crisis, as well as minimisation of time needed to recover from the damages. An efficient recovery plan is crucial to production resumption and overall business continuity. 

Reinforcement – A company’s initiatives to support infrastructure security need to be shared with all stakeholders through all channels at one’s disposal. Furthermore, cultivating a risk-aware culture in the company, from top to bottom, plays an important role in infrastructure security. 

Conclusion 

The responsibility of critical infrastructure security lies with the government. Still, organisations need to implement adequate practices in order to guard against infrastructure security risks. In fact, this requires multiple layers of protection and different stages of evaluation. 

Hence, companies should collaborate with a preferred security partner and choose a programme that can enable and deliver business success. Alternatively, delays in implementing proper security protocols can expose a business to evolving threats of a very unpredictable nature. 

Therefore, organisations with an integrated approach to security can successfully mitigate the risks of infrastructure casualties.  

Security experts – like Panoptic Solutions – can help you identify vulnerabilities and improve your security to future-proof your company. You can have the safety and security you need, as well as the peace of mind you deserve.