Critical Infrastructure and IoT Survivability

Written by Blogger

August 27, 2024

This content represents a particular viewpoint and may not reflect the views of all individuals

Here is what is going to affect the current landscape that we deal with in the Integrating the Internet of Things (IoT) into critical infrastructure in cities can offer numerous benefits, including improved efficiency, enhanced services, and better resource management. However, this integration also comes with certain risks and challenges that need to be carefully addressed. Here are some key risks associated with cities integrating IoT into critical infrastructure:

Security Concerns:

Cybersecurity Threats: Increased connectivity creates more entry points for cyberattacks. IoT devices are often vulnerable to security breaches, and a successful attack on critical infrastructure could have severe consequences.

Data Privacy: Collecting and sharing large amounts of data through IoT devices may lead to privacy concerns if not handled securely. Unauthorized access to sensitive information can compromise citizen privacy and trust.
Reliability and Resilience:

Dependency on Technology: Cities become highly dependent on the proper functioning of IoT devices. Malfunctions, technical glitches, or cyberattacks could disrupt essential services, leading to potential economic and social consequences.

Resilience to Disasters: Natural disasters or large-scale cyber-attacks could severely impact interconnected IoT systems. Ensuring resilience and redundancy in critical infrastructure is crucial to minimize disruptions.
Interoperability Issues:

Compatibility Challenges: Integrating diverse IoT devices from different manufacturers may result in compatibility issues. Standardization efforts are essential to ensure seamless communication and interoperability between devices.

Liability Issues: Determining liability in the event of a security breach or system failure can be challenging. Establishing clear regulations and responsibilities is crucial.
Scalability and Maintenance:

Scalability: As cities expand their IoT infrastructure, ensuring scalability becomes a significant challenge. Systems need to accommodate a growing number of devices and evolving technology.

Maintenance and Updates: Regular maintenance and updates are essential to address vulnerabilities and improve system performance. Neglecting these aspects could result in increased risks over time.
Public Perception and Trust:

Perceived Intrusiveness: The deployment of IoT devices for surveillance or data collection may lead to concerns about invasions of privacy. Managing public perception and building trust is crucial for successful integration.
Third-Party and Vendor Risks:

Supply Chain Dependencies: Organizations often rely on a network of suppliers, vendors, and service providers. Any vulnerabilities in their systems could be exploited, affecting the overall supply chain security.

Hold onto your Butt…Here goes 2024 …

The White House, Congress, and federal agencies raced to keep up with a rapidly evolving cybersecurity landscape throughout 2023, a year characterized by the introduction of new artificial intelligence tools, record-breaking ransomware attacks, and emerging threats to critical infrastructure sectors across the country.

The administration issued a wave of guidance – most notably the national cybersecurity strategy issued by the Office of the National Cyber Director in March. The plan seeks to fundamentally shift the bulk of cybersecurity responsibilities from end users to the organizations most capable and best positioned to mitigate threats while realigning cybersecurity incentives to favor long-term investments in “secure by design” principles (see: White House Unveils Biden’s National Cybersecurity Strategy). Paper thin if you asked me ……China is kicking our Cyber Security ass’s.

Millions of Americans nationwide also began harnessing the power of AI technologies in 2023, from ChatGPT to the explosion of new machine learning tools and services available across the web. The White House meanwhile secured voluntary commitments from big tech firms leading AI development to follow a set of best practices, and it worked with international partners to form a G7 Code of Conduct for AI development (see: G7 Unveils Rules for AI Code of Conduct – Will They Stick?).

But so far, the recent AI guidance and cybersecurity requirements remain largely voluntary and unenforceable. Congress has signaled plans to introduce bipartisan, comprehensive legislative to begin regulating AI, as well as new cybersecurity mandates to secure the supply chain. As lawmakers gear up for a new year of legislative priorities…..we still can’t fix F#@$# PASSWORDS ISSUES and fit our OT issues nationally …..HOLD ONTO YOU BUTT …..this is going to be nuts this year !!!

Here are the cold hard facts…..Here are my findings – I am just ahead of the curve…If you have been following what I have been up to … Here are the facts…

#Electricity – Failing any surges or damage to infrastructure, the electricity will likely last for several days to several weeks, depending upon it generation source and the overall levels of repairs of the infrastructure. After that point, most major cities will be in darkness and many minor areas (unless they have windmills or solar panels) will also be dark. ETA for family survival – 42%

#Water – Is pumped under pressure into water towers which equalize their pressure using electrically-powered pumps. After the power fails, unless there is major damage to pressurized lines, water pressure should remain strong for several days, tapering off after a week in major cities. In smaller towns, the residents may be able to retain water pressure by diverting electricity to pumps to maintain it. Major fires will deplete this reserve if the water is used to extinguish them. ETA for family survival – 34%

#NaturalGas – The wild card. There are likely going to be one or more major gas explosions after an incident and unless the gas pressure is reduced to those fires they will keep burning until they have exhausted their fuel. Plan on gas lasting several days at the MOST; perhaps less than that. ETA for family survival – 21%

#Gasoline/Vehicle fuel – Requires electricity to pump, but can be made available using portable electric or hand pumps. Most stations need to be refueled every other day, so most stations will be drained within several days. Unless you are near a storage facility or a refinery, expect gas shortages within a week or less. ETA for family survival – 19%

#Coal – Should be plentiful in many areas (most areas have at least one coal-fired plant) and it can be burned for fuel. It is exceptionally dirty; it will likely cause respiratory ailments and it will be difficult for many to use. ETA for family survival – 43%

So look at it like this – you have less than a 50% chance of survival for a family of 4 – Factors Male/Wife – 2 kids – Less than 50% based upon area and range of national resources….more to come. The need for work in the IoT critical infrastructure is obvious and is poorly addressed. The time is now to focus efforts and make a change.

 

See Also: JavaScript and Blockchain: Technologies You Can’t Ignore

Forensic-Impact Articles

Digital Privacy: A Computer Crimes Investigator Perspective

Digital Privacy: A Computer Crimes Investigator Perspective

Guest Blogger: Jacob SipeIn my years of service with the military, I had the unique opportunity to dive into computer forensics and digital privacy. As a computer forensics analyst and Computer Crime Investigator, I developed my skills in understanding and dissecting...

Become a Digital Forensics Entrepreneur: A Quick Guide

Become a Digital Forensics Entrepreneur: A Quick Guide

Building a business is like raising a child. You invest time, energy, and love into its growth. After 25 years with Paraben, I'm filled with pride and gratitude to see how far it has come. It's a testament to the hard work and dedication of our team, and I'm thrilled...

Memory Forensics Tools Overview

Memory Forensics Tools Overview

Guest Blogger: Kokab RasoolMemory forensics is becoming more essential in incident response and threat analysis as new threats and sophistication arise in the changing cybersecurity landscape. Memory forensics, as opposed to traditional approaches that rely on hard...