Cyber defense



Download 2.54 Mb.
View original pdf
Page55/85
Date09.12.2022
Size2.54 Mb.
#60094
1   ...   51   52   53   54   55   56   57   58   ...   85
Cyber Defense Handbook
CIBERDEFENSA
ORIENTACIONES PARA EL DISEÑO, PLANEAMIENTO, IMPLANTACIÓN Y DESARROLLO DE UNA CIBERDEFENSA MILITAR
66 The cyber threat to mobile communication devices (smartphones and tablets) must be considered distinctly because these devices have additional cyber risks.
447.
Despite the fact that a current mobile device is a computer system in itself, the need to protect it against cyber attacks is not perceived to the same extent as conventional IT systems (computers, computer networks, etc. This lack of awareness makes these devices especially vulnerable.
448.
Mobile devices are exceptionally attractive for cyber threats, because they are multi-format data, voice and video) and multipurpose (ByOD
39
); they are an extension of the owner with a camera and a microphone. Except in cases of specific restrictions, they are usually with the owner at all times, attending meetings and discussions, and seeing and hearing the same that the attendees are doing. They are also potentially geolocatable.
449.
Cyberattacks on mobile devices in order to control applications, camera and microphone are not difficult for expert cyber attackers, even when the device is turned off.
450.
Other targets to pay special attention to are critical infrastructures because an impact on them could have devastating consequences at the national level. The globally accepted critical infrastructure sectors are energy, public health, water supply, agriculture and food, banking and finance, information technologies, transportation, chemical industry, nuclear industry, space, research and development, and public administration. There is a false perception that critical infrastructures do not connect to the Internet and therefore are not at risk of a cyber attack. Not only do most of the information systems that control critical infrastructure connect to the Internet, but those few that are isolated are also vulnerable to cyberattacks.
453.
All the strategic sectors have many facilities located indifferent geographical locations, along way from each other. Therefore, decentralized management and maintenance would mean an unaffordable multiplication of resources for critical infrastructure operators, most of which are private companies oriented towards economic benefits. For this reason, all the systems that control critical infrastructures, to a greater or lesser extent, are connected to the Internet to have a centralized management and maintenance system.
454.
The criticality of the critical infrastructure sectors together with its global connectivity requires extreme protection against cyber threats for the critical infrastructures and, in particular, the electricity and IT sectors, since the rest of the sectors depend on them to operate.

Download 2.54 Mb.

Share with your friends:
1   ...   51   52   53   54   55   56   57   58   ...   85




The database is protected by copyright ©ininet.org 2024
send message

    Main page