{"id":309,"date":"2025-04-29T03:05:35","date_gmt":"2025-04-29T03:05:35","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/darlaeldridge\/?p=309"},"modified":"2025-04-29T03:05:35","modified_gmt":"2025-04-29T03:05:35","slug":"safeguarding-critical-infrastructure-strengthening-cyber-resiliency","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/darlaeldridge\/2025\/04\/29\/safeguarding-critical-infrastructure-strengthening-cyber-resiliency\/","title":{"rendered":"Safeguarding Critical Infrastructure: Strengthening Cyber-Resiliency"},"content":{"rendered":"\n<p><strong>Strengthening Critical Infrastructure Cybersecurity (BLUF)  <\/strong><br>        Increasingly, cyber threats may gravely harm our critical infrastructure, including <br>power grids, water supply, and transportation systems. Therefore, I argue for the urgent need for <br>the adoption of responsible policies for critical infrastructure development to have stronger <br>cybersecurity standards justifiably imposed across the public and private sectors, enshrined in <br>well-constituted regulatory frameworks. The issues are complicated, and no simple solution <br>exists, but it is of utmost importance that an ethical approach be applied to securing critical <br>infrastructure before catastrophic events happen. Furthermore, in the following section, we <br>examine the responsible cyber-infrastructure development perspective. <br><strong>The Responsible Cyber-Infrastructure Development Perspective  <\/strong><br>        The responsible cyber-infrastructure development principle is that ethical, societal, <br>and political implications must, therefore, be taken into account in the creation and maintenance <br>of systems. This principle applied to critical infrastructure means that resilience and security <br>must come first for governments and private enterprises, and not short-term cost savings and <br>convenience. We need to accept the fact that cyberattacks against critical resources are real and <br>have already occurred, such as the Colonial Pipeline in 2021 (Colonial Pipeline, 2021). <br>        At a minimum, governments will require cybersecurity standards for critical <br>infrastructure sectors as a health and safety code applies to specific physical infrastructure. <br>Businesses should not be able to treat cybersecurity considerations in establishing essential <br>services as optional or secondary. Allowing societal burden to rest solely on private business by a <br>laissez-faire approach creates unacceptable risks for society as a whole. In addition, <br>public-private initiatives need to be broadened to facilitate improved threat intelligence sharing, <br>facilitate collaborative incident response, and joint investment in defensive technologies. <br><strong>Evidence Concerning Current Threat Landscapes<\/strong> <br>        Stronger cyber policies are needed, as evidenced by several real-world incidents. Attacks <br>on hospitals, the food supply chain, and water systems proved the existence of vulnerabilities <br>beyond those aimed at the Colonial Pipeline. For example, the attempted poisoning of drinking <br>water by hackers (who raised the level of lye to unsafe amounts, using a Florida water treatment <br>plant in February 2021) was aimed at causing a major disruption (Perlroth, 2021) (3). <br>Fortunately, it was prevented from achieving its objective, but it did show just how woefully <br>unprotected some facilities are. <br>        The United States Cybersecurity and Infrastructure Security Agency (CISA), the FBI, <br>and the Department of Justice have continually warned that foreign nation-states and criminal <br>organizations are poking around in critical infrastructure networks. The more new technologies <br>are added, such as IoT sensors and AI, to infrastructure systems, the more dramatically the attack <br>surface increases and the opportunities for exploitation multiply (CISA, n.d; DOJ, 2021). It is a <br>well-known concern that in the absence of mandatory cybersecurity protocols, critical sectors <br>may underspend on security due to the economic pressures of business as usual. <br>        It is going to leave such decisions completely up to individual organizations, and that <br>poses problems concerning system-wide vulnerabilities. Such a network will have highly <br>interconnected nodes; therefore, the failure of just one node will percolate through the entire <br>system, resulting in disruption on an immense scale, economic collapse, or even death. But, do <br>we have any objections? <br><strong>Counterarguments and Ethical Complexities  <\/strong><br>        Now let&#8217;s look at mandating improvements in cybersecurity; however, it does require <br>confronting many challenges. One objection is otherwise valid, for it could impose significant <br>costs on small and medium-sized service providers and possibly drive many of them out of <br>business or into monopolies, while another would be that too much government engagement <br>might stifle innovation and produce bureaucratic inefficiencies that delay important <br>advancements. <br>        Those concerns stand. Regulations must be flexible, and small providers may have <br>government subsidies or tax credits to defray compliance costs. Regulating principles outcomes, <br>like resilience and capabilities for threat detection, rather than prescriptive mandates dictating <br>exact technologies or methods-preferably adopts a principle-based approach to allow <br>organizations to innovate towards an all-inclusive approach. <br>        No security system can be perfect. Even the best defenses cannot withstand a very <br>determined, resourceful, and highly skilled attacker. This reality begs for &#8220;defense in depth&#8221;-that <br>is, layered security measures so that the chances of failures in the event of successful breaches <br>remain relatively low. <br><strong>The Short Arm: Long-Term Ramifications <\/strong><br>        Apparatuses would pay dire prices and would also end up worse than the immediate <br>threat. Attack through a saboteur into the control systems of either the power grid or financial <br>systems could lead to cascading societal failures &#8211; sending hospitals into darkness, food as scarce <br>as hen&#8217;s teeth, sending transport systems into confusion, and causing panic among societies. Risk <br>builds, decade after decade, if investments in cybersecurity improvement do not catch up with <br>emerging technological advancements (DOE, 2020). <br>        It may be difficult to make critical systems survivable if the AI introduces <br>self-propagating malware and other such beneficial exploits into the networked computers of <br>one&#8217;s country. Current prediction models indicate that by 2040, most cyberattacks will be carried <br>out automatically, exploiting several vulnerabilities at once, and without any human oversight. <br>Continuous investment in resilience will be joined with the cultivation of a psychocultural <br>attitude towards cybersecurity across industries, creating leaders and a workforce well-versed in <br>a cybersecurity-aware environment. Which leads me to my next topic: the future of digital safety. <br><strong>Conclusion: The Future of Digital Safety <\/strong> <br>        It is my proposition in this paper that to secure the critical infrastructure system, careful <br>and assertive measures must be considered in cybersecurity policy development. Disturbing <br>real-life examples of attacks are indications that there should be minimum obligatory standards <br>of the working environment for cybersecurity, and these standards should correspond to the <br>threats imposed. Truly, such considerations regarding costs and impacts on innovation are <br>legitimate; however, no project ever designed will guarantee full security. On the contrary, <br>irresponsibility is poised to weigh heavily, should people decide to stand by as atrocities unfold <br>before them. <br>        It is to bearing in mind that they need to work out regulations for a balance between <br>security and economic viability of its maintainability, and the predictability of an event in <br>technology shift at a time would seem monumental. But if one sees those complexities, it can <br>become the very strength of the case for immediate action. Cyber-resilient infrastructure must be <br>put into construction now to save the prospect of shared catastrophes tomorrow. <br>We cannot afford to rest on our laurels or rely on some last-minute stroke of luck. The <br>combination of responsible development of cyber-infrastructure and anticipation of unpredictable <br>ramifications of technological evolution may be the best bet on the future of critical social <br>functions in an increasingly connected world. <br><br><strong>References <\/strong><br>Colonial Pipeline. (2021, May 10). Colonial Pipeline system incident update. Retrieved from <br>https:\/\/www.colpipe.com\/news-insights\/media-resources\/post\/media-statement-update-co<br>lonial-pipeline-system-disruption\/   <br>Cybersecurity and Infrastructure Security Agency (CISA). (2023, February 9). CISA warns of <br>threats to critical infrastructure sectors. Retrieved from <br>https:\/\/www.cisa.gov\/topics\/critical-infrastructure-security-and-resilience <br>U.S. Department of Justice. (2021, June 7). Department of Justice seizes $2.3 million in <br>cryptocurrency paid to the ransomware extortionists Darkside. <br>https:\/\/www.justice.gov\/opa\/pr\/department-justice-seizes-23-million-cryptocurrency-paid-ransomware-extortionists-darkside <br>Perlroth, N. (2021, February 8). Florida city\u2019s water supply hacked in cyberattack, officials say. <br>The New York Times. Retrieved from <br>https:\/\/www.nytimes.com\/2021\/02\/08\/us\/oldsmar-florida-water-supply-hack.html <br>U.S. Department of Energy. (2020, July). Multiyear plan for energy sector cybersecurity. Office <br>of Cybersecurity, Energy Security, and Emergency Response. Retrieved from <br>https:\/\/www.energy.gov\/sites\/default\/files\/2020\/07\/f76\/DOE-CESER-Multiyear-Plan-for<br>Energy-Sector-Cybersecurity_0.pdf<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Strengthening Critical Infrastructure Cybersecurity (BLUF) Increasingly, cyber threats may gravely harm our critical infrastructure, including power grids, water supply, and transportation systems. Therefore, I argue for the urgent need for the adoption of responsible policies for critical infrastructure development to have stronger cybersecurity standards justifiably imposed across the public and private sectors, enshrined in well-constituted&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/darlaeldridge\/2025\/04\/29\/safeguarding-critical-infrastructure-strengthening-cyber-resiliency\/\">Read More<\/a><\/div>\n","protected":false},"author":30589,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/darlaeldridge\/wp-json\/wp\/v2\/posts\/309"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/darlaeldridge\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/darlaeldridge\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/darlaeldridge\/wp-json\/wp\/v2\/users\/30589"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/darlaeldridge\/wp-json\/wp\/v2\/comments?post=309"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/darlaeldridge\/wp-json\/wp\/v2\/posts\/309\/revisions"}],"predecessor-version":[{"id":312,"href":"https:\/\/sites.wp.odu.edu\/darlaeldridge\/wp-json\/wp\/v2\/posts\/309\/revisions\/312"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/darlaeldridge\/wp-json\/wp\/v2\/media?parent=309"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/darlaeldridge\/wp-json\/wp\/v2\/categories?post=309"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/darlaeldridge\/wp-json\/wp\/v2\/tags?post=309"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}