THE FIRETIDE BLOG

New threats to critical infrastructure highlight the need for reliable video surveillance

Dec 30, 2015

Power Lines.jpgHackers represent some of the most prominent threats to security in private and public sectors alike. In 2015, there were billions of attempted cyberattacks, some more threatening and more successful than others. The result, according to the Identity Theft Resource Center, was the exposure of more than 177 million records.

This is alarming, to say the least. However, it hardly compares to some of the larger-scale cyberattack methods that may be used to target critical infrastructure in the very near future. Cybercriminals have already begun going after critical infrastructure, and many cybersecurity specialists believe they will do so with more fervor in years to come, especially as smart-city and smart-grid technology are realized.

While improved authentication and cybersecurity have been the focus of discussions about how to protect critical infrastructure, reliable video surveillance will play an equally important role in helping to prevent unauthorized access by cyberattackers, and providing security monitoring in the event of a cybercrime-related emergency.

The electric grid and nuclear power in the cross hairs

Cybersecurity software and multi-factor authentication aim to keep hackers away from virtual entry points, but video surveillance is essential protecting real-world spaces that, if accessed by a cybercriminal, could result in a crippling cyberattack to critical infrastructure. Instances in which physical breaches have led to damaging data breaches have occurred in the past. The most recent profile example came in the form of the 2014 Sony Picture breach that resulted in the removal of "The Interview" from theaters. According to Business Insider, the hackers were only able to orchestrate the attack because they somehow were allowed entry into one of Sony Picture's offices. 

Apply this concept to the electric grid - which ISIS hackers have already targeted – or to nuclear power plants, whish studies have found to be vulnerable to cyberthreats. The impacts of these cyberthreats have real-world implications, and as made clear by the Sony Pictures breach, virtual vectors are not the only vulnerabilities. This means that physical infrastructure such as the power grid and nuclear facilities must be highly guarded, and well-monitored – and this is where video surveillance comes into the picture. Security monitoring will be hugely important to ensuring proper authorization in critical facilities, and especially restricted areas that if trespassed, could result in a cyberattack. This will be particularly true as the smart grid becomes a reality, and the number of hackable endpoints increases. 

How mesh topology and wireless technology can make a good thing better

Video surveillance will play a key role in providing real-world protection of physical gateways to virtual assets that can be used to create big problems for critical infrastructure. Firstly, video surveillance will act as a deterrent, and as a security monitoring tool, which can help keep threats out or alert officials of a potential intruder before serious damage can be done.

Secondly, in the worst-case scenario that, say, an attack on the electric grid manages to knock out power in certain areas, video surveillance that leverages a wireless mesh network may be able to stay up and running for more time thanks to the self-healing nature of mesh topology. The beauty of a mesh network is its resilience. A disruption in one area does not mean that surveillance comes to a halt. Network traffic is redirected so that security monitoring can resume. The same principal applies to a mesh network that utilizes wireless technology. The main difference is that the network is not as reliant on fiber, which makes it useful for sprawling areas and some forms of public transportation, and ideal in the event of an emergency. 

Protecting critical infrastructure from intruders has always been a top priority, just as video surveillance has always been there to get the job done. More importantly, it will continue to be there as law enforcement and government agencies begin preparing to defend against sneaky new attack strategies that may target critical infrastructure.  


Tags:
Category: Public Safety

Archive