Cyberattacks
A cyberattack that has devastating impact depends on when the attack is launched. Almost 40% of industrial control systems encounter cyberattacks in the cooperate world. Companies with critical infrastructures such as Windows XP, which is unmatchable, are at significant risk because of the lack of updates for vulnerability and bug fixing. Cybersecurity attacks can be launched on healthcare technology, traveling technology, and identity data held by institutions and governments. The World Economic Forum (WEF) has identified cybersecurity as a significant cause of disruption in the next five years. Cybersecurity attackers can trigger and breakdown systems that run society functions. Hackers can target the power grid system, the water purification systems, and a financial sector system that harms society’s operations.
Companies and governments are not doing enough to protect their systems. Most systems are outdated and have a critical infrastructure that does not allow updating. These systems rely on the Internet of Things (IoT), which are unmatchable by design. IoT creates a smart world by merging physical and virtual environments. Devices can be connected through the internet and communicate with one another, but this presents a new level of vulnerabilities. Cyberwarfare is asymmetric, with each hacker having different intentions from hostile ones to those who do it for the fun of it. The government should enforce cybersecurity regulations with teeth and involve hackers in the information security community rather than criminalizing their activity.
The 911 attack involved attacks on systems due to distributed denial of service attacks (DDoS) back in 2016. In 2018, a federal court charged Charles Tucker to 20 months for launching DDoS attacks on city websites with Madison, Wisconsin being hit the most. Organizations have also experienced DDoS attacks through bots on their phones and computers infected by malware from a hacker. The malware operates in convert with the bots and allows connection to malicious traffic, which exposes information to several vulnerabilities. The countermeasures are with flaws and involve blocking 911 calls, thereby preventing the legitimate need for help. Telecommunication companies, lawmakers, and emergency personnel can work together to yield a significant breakthrough.
States are now allowing callers to transmit much more affluent and detailed information through emergency calls other than the 911 systems. The data is then shared with the 911 call centers and other first responders. The networks that feed information to the answer points are IP-based, which are vulnerable to cyberattacks. If the Next Generation 911 systems are compromised, then more harm shall be caused than saving lives. States are focusing on the security needs of the NG911 systems. Currently, the 911 systems risk is low because of the limited internal networks and points of connection to outside networks. The system is voice-based with computer-aided dispatch systems that only operate internally. The DHS recommends public safety agencies to adhere to specific cybersecurity framework that is a flexible and risk-based approach to security infrastructure improvement. Cybersecurity attacks on NG911 systems will have to sever implications such as loss of life or property resulting from hampered response operation.