My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
2016-069V
CBCC
>
Official Documents
>
2010's
>
2016
>
2016-069V
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
10/9/2016 1:13:21 AM
Creation date
7/25/2016 12:18:14 PM
Metadata
Fields
Template:
Official Documents
Official Document Type
Plan
Approved Date
05/17/2016
Control Number
2016-069V
Agenda Item Number
8.B.
Entity Name
Emergency Services
Subject
Basic Plan 2016-2020 Comprehensive Emergency Management Plan
Document Relationships
2016-044
(Attachments)
Path:
\Resolutions\2010's\2016
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
186
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
(2) Computer Accidents, Sabotage and Critical <br /> Infrastructure Disruption — Hazard Identification. <br /> The President's Commission on Critical Infrastructure <br /> Protection (PCCIP) recently reported that there is <br /> increasing threat that the U.S. could suffer something <br /> similar to an "Electronic Pearl Harbor" (Rubin, 1998). <br /> Networked information systems present new security <br /> challenges in addition to the benefits they offer. Long- <br /> term power outages could cause massive computer <br /> outages, with severe economic impacts such as loss of <br /> sales, credit checking, banking transactions, and ability <br /> to communicate and exchange information and data. <br /> "Today, the right command sent over a network to a <br /> power generating station's control computer could be <br /> just as effective as a backpack full of explosives, and <br /> the perpetrator would be harder to identify and <br /> apprehend," states the PCCIP report. <br /> With the growth of a computer-literate population, <br /> increasing numbers of people possess the skills <br /> necessary to attempt such an attack. The resources to <br /> conduct a cyber attack are now easily accessible <br /> everywhere. A personal computer and an Internet <br /> service provider anywhere in the world are enough to <br /> cause a great deal of harm. Threats include: <br /> • Human error; <br /> • Insider use of authorized access for <br /> unauthorized disruptive purposes; <br /> • Recreational hackers - with or without hostile <br /> intent; <br /> • Criminal activity - for financial gain, to steal <br /> information or services, or organized crime; <br /> • Industrial espionage; <br /> • Terrorism - including various disruptive <br /> operations; and <br /> • National intelligence - information warfare, <br /> intended disruption of military operations. <br /> The effects of such activities may take the form of <br /> disruption of air traffic controls, train switches, <br /> banking transfers, police investigations, commercial <br /> Indian River County Comprehensive Emergency Management Plan Basic Page 74 <br />
The URL can be used to link to this page
Your browser does not support the video tag.