12.07.2015 Views

DISASTER! - Homeland Security and Emergency Management ...

DISASTER! - Homeland Security and Emergency Management ...

DISASTER! - Homeland Security and Emergency Management ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

transportation <strong>and</strong> utility systems - also known as “critical infrastructure”.Because technologies have improved our access to information, we haveopened ourselves up for attacks by our enemies to destroy or alter this data.Cyberterrorism is different than computer crime or “hactivism” (which canbe costly <strong>and</strong> a pain to fix but doesn’t threaten lives or public safety.)Cyberterrorism is usually done with a minimal loss of life but there aresome groups that could use cyber attacks or cyber warfare to cause humancasualties or fear by disrupting transportation or public safety systems.For example, prior to Russia invading Georgia in 2008, Georgian Internetservers were overloaded by multiple coordinated distributed denial ofservice (or D.D.O.S.) attacks. These attacks crippled Georgia’s government,media, communications <strong>and</strong> transportation web sites before <strong>and</strong> afterRussian troops entered South Ossetia. It’s the first time a cyberattackcoincided with a shooting war according to some Internet experts. 6We are not trying to cause worry or panic, but underst<strong>and</strong> the possibilityexists <strong>and</strong> services could be disrupted or cut off or man-made disasterscould happen due to cyber attacks. For example, services like banking, gaspumps, or internet access could be down or slow. And some emergencyplanners are concerned a cyber attack combined with a physical act ofterrorism (like a “dirty bomb” or releasing a chemical or biological agent)could potentially interfere with response capabilities.Most countries have agencies committed to securing <strong>and</strong> monitoring criticalinfrastructure <strong>and</strong> share information on a regular basis. Businesses <strong>and</strong>consumers can help too by taking some preventative measures.BEFORE A CYBER ATTACK:Protect computers - Make sure your computers <strong>and</strong> wireless devices havecurrent anti-virus software <strong>and</strong> firewalls, <strong>and</strong> update <strong>and</strong> scan them often.Learn about US-CERT - Consumers <strong>and</strong> businesses should take some timeto visit the United States Computer <strong>Emergency</strong> Readiness Team <strong>and</strong> learnmore about Internet security at www.us-cert.govStay current on threats & alerts - The Department of <strong>Homel<strong>and</strong></strong> <strong>Security</strong>www.dhs.gov <strong>and</strong> Public Safety Canada www.publicsafety.gc.ca postalerts <strong>and</strong> news about national security online.What .. no services? - Think about how you would h<strong>and</strong>le not having accessto the Internet, phones, ATMs <strong>and</strong> other electronic devices you use daily. Acyber attack could disrupt or crash systems so have a backup plan <strong>and</strong>listen to authorities for updates.www.itsadisaster.net or call 1-888-999-432587

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!