This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Natural resources

EFFECT OF CYBERSECURITY ATTACKS ON PIPELINES AND NATURAL RESOURCES

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

EFFECT OF CYBERSECURITY ATTACKS ON PIPELINES AND NATURAL RESOURCES

Introduction

Cyber threats are a widespread form of risk that is faced by most of the organization in the present era. It is the type of attack that tends to steal and damage data that are confidential for an organization. However, the cyber threats also there on the pipeline operators and even in losing the natural resources of the nation.

Types of cyber threats and their impact on the economy

It was observed those five years ago, a hacker under the name of Ugly Gorilla stole tons of confidential data from the gas pipeline companies of the country (Pipyros, Mitrou & Gritzalis, 2017). The situation resulted in a massive financial loss of the organizations which have breached 3 lakh web of steel. Such an incident has shaken the pipeline organizations, which used to be one of the most significant contributors to the country. The economy of the country, as a result, has suffered a tremendous loss.

The cyberattack on the shared data network has led to forcing shut down four of the natural gas pipelines of the country. It had also directed to curtailing the communication with the customers through computers. However, the gas supply was not interrupted, and the news of data stolen was not bright at the moment. Not only the gas pipelines but also the various other natural resources of the country are prone to cyber threats. The pipe and the gas transmission system have been targeted as the central area of hacking. It is because they are considered to be the most valuable contributor to the economy of the country. The cyber threats thus create a high impact on the economy of a country (Nikkarila, Åkesson, Kuikka & Hämäläinen, 2018).

Don't use plagiarised sources.Get your custom essay just from $11/page

Implementation of diversity and commonality for mitigating threats

Crimeware

It can be described as the most common form of cyber attacks with all kinds of malware and malicious accounts to increase cybercrime. Ransomware, in this context, can be cited as the best example. This kind of cyber attack occurs when the software of a device is not updated, and the operating system is also not updated. Backups are required to be created to remove unwanted files and to clean the machine.

Distributed Denial of Service (DD0S)

Such kinds of attacks usually occur in large organizations, and its main feature includes creating obstacles for using the system and network freely and effectively. To mitigate specific risks, proper DDOS mitigation strategies are required to be present in the operation of the organization. The devices are required to be tested regularly to ensure that it is free from such viruses (Kopp, Kaffenberger & Jenkinson, 2017).

Fraud

It includes individual suspicious emails from the higher authority to all the employees regarding sudden transfers or any sudden changes in the organization. While it may sound simple, however, it tends to work most of the time. To mitigate it, the financial sections of the organization are required to be instructed not to transfer funds without informing the higher authority of the organization.

Conclusion

At last, it can be concluded that the various cyber crimes that exist in society hamper not only the organization but also the economy as a whole. The natural resources also tend to get exploited in this context, and as a result, the economy suffers a lot. Therefore, the risks are required to be mitigated by the organizations.

 

 

References:

Pipyros, K., Mitrou, L., & Gritzalis, D. (2017). Evaluating the effects of cyber-attacks on critical infrastructures in the context of Tallinn Manual. In Information Security & Critical Infrastructure Protection (INFOSEC) Laboratory, Dept. of Informatics, Athens University of Economic and Business, Conference Paper (Vol. 5).

Nikkarila, J. P., Åkesson, B., Kuikka, V., & Hämäläinen, J. (2018, June). Modelling Closed National Networks: Effects in Cyber Operation Capabilities. In ECCWS 2018 17th European Conference on Cyber Warfare and Security V2 (p. 323). Academic Conferences and publishing limited.

Kopp, E., Kaffenberger, L., & Jenkinson, N. (2017). Cyber risk, market failures, and financial stability. International Monetary Fund.

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask