HSM 101 Week 3 Discussion
pdf
keyboard_arrow_up
School
Ashford University *
*We aren’t endorsed by this school
Course
101
Subject
Information Systems
Date
Apr 3, 2024
Type
Pages
2
Uploaded by MagistrateBook11108
Information Technology as a Critical Infrastructure
Information Technology (IT) is one of the 16 critical infrastructures the Department of Homeland Security identified. It plays a vital role in supporting American society, particularly in the areas of communication, business operations, and government services.
Vulnerability to Cyberattacks
The IT infrastructure is highly vulnerable to cyberattacks. This vulnerability stems from several factors:
•
Interconnectivity:
The interconnected nature of IT systems means that a breach in one system can potentially affect others.
•
Dependence on software:
IT systems rely heavily on software, which can contain bugs or vulnerabilities that hackers can exploit.
•
The human factor:
Human error or negligence can lead to security breaches.
Examples of Cyberattacks
There have been numerous instances of cyberattacks on IT infrastructure. Here are a few examples:
1.
The WannaCry ransomware attack (2017):
affected hundreds of thousands of computers worldwide, encrypting files and demanding a ransom in Bitcoin to unlock them.
2.
The SolarWinds hack (2020):
This sophisticated attack compromised the systems of several U.S. government agencies and private companies.
3.
The Equifax data breach (2017):
The personal data of nearly 147 million people was exposed in this attack on the credit reporting agency.
Effects of Interruption
The interruption of IT infrastructure can have severe effects, including:
•
Disruption of services:
Many services, from banking to healthcare, rely on IT. An interruption can disrupt these services, causing inconvenience and potential harm.
•
Economic impact:
Businesses can lose revenue due to service disruptions, and the cost of responding to a cyberattack can be significant.
•
Loss of trust:
Cyberattacks can erode public confidence in institutions and businesses.
•
National security risks:
If government systems are compromised, it can threaten national security.
In conclusion, while IT infrastructure is essential to modern society, it is also vulnerable to cyberattacks. Therefore, investing in cybersecurity measures to protect this critical infrastructure is crucial.
Reference
Epic.org. (n.d.) Electronic Privacy Information Center. https://archive.epic.org/privacy/data-
breach/equifax/
Government Accountability Office. (2021). https://www.gao.gov/blog/solarwinds-cyberattack-
demands-significant-federal-and-private-sector-response-infographic
National Cybersecurity and Communications Integration Center. (n.d.). https://www.cisa.gov/sites/default/files/FactSheets/NCCIC%20ICS_FactSheet_WannaCry_Rans
omware_S508C.pdf
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help