A Guide for Public Safety Leaders
Total Page:16
File Type:pdf, Size:1020Kb
PROTECTING AGAINST CYBERATTACKS: A GUIDE FOR PUBLIC SAFETY LEADERS 1 Protecting Against Cyberattacks A NOTE FROM THE CHIEF One of the most prevalent changes in today’s As a result, fire leaders have a new task. fire service is the advent of technology, which Cybersecurity has become our collective quite literally has infiltrated every aspect of responsibility, not just the responsibility of our professional lives. our IT department. This publication intends to enlighten fire leaders about issues related Technology is keeping firefighters safer and to cybersecurity, including identifying better protected. For example, self-contained threats to departments and strategies to breathing apparatus (SCBA) not only weigh protect networks. much less today than in the past, but also include technology such as thermal imaging Fortunately, fire leaders don’t have to know cameras (TICs) and personal alert safety all the terminology, understand the details system (PASS) devices integrated directly into of how systems work, or know how to best the packs. protect those systems. Instead, leaders need to know how to ask the right questions. Firefighters have access to advanced Included in this publication are questions to technologies to improve firefighting ask your IT professionals, tips for building capabilities, such as compressed air foam a stronger working relationship with them, systems (CAFS) and positive pressure training strategies, and much more. ventilation (PPV) fans. Fire trucks are equipped with mobile data computer (MDC) software, Do not wait until it’s too late to learn about portable radios that are actually mini- cybersecurity. Do not learn the lessons the computers, and have direct access to the hard and costly way. Just as fire leaders have data and information within computer-aided embraced technology to improve safety and dispatch (CAD) systems. operations, let’s tackle cybersecurity with that same passion and be instrumental in However, as the digital world continues continuing to protect our departments. to proliferate into our professional infrastructure, so does risk. Cyberattacks can Be safe, cripple these technological systems and jeopardize our ability to protect lives Sam Greif and property. Fire Chief of Plano, Texas Member, IAFC’s Terrorism and Homeland Security Committee Protecting Against Cyberattacks 2 TABLE OF CONTENTS SECTION 1: VULNERABILITY TO CYBERATTACKS 4 Agencies Under Cyberattack: Staying Ahead of the Hackers 8 Ransomware and Other Cyberattacks: How Criminals Are Targeting Personal Information 12 Technology is Changing Healthcare, But Not Without Risk SECTION 2: PROTECTING AN AGENCY FROM CYBERATTACKS 14 11 Questions to Ask Your IT Department to Protect Against Cyberattacks 18 Tips for Improving Communication with IT 22 Preparing for a Cyberattack: Creating Contingency and Backup Plans 28 Tips on Training Adult Employees in the Workplace 31 Do’s & Don’ts of Online Activity ABOUT THE PUBLICATION American Military University produces high- has provided a forum for its members to quality, thought-provoking publications that exchange ideas, develop professionally and address important issues for professionals uncover the latest products and services who work in the fire service, law enforcement, available to first responders.” corrections, emergency response, and public health. To access our library of publications, A special thanks to the contributors who lent please visit InPublicSafety.com/library. their experience and expertise to create this magazine as well as IAFC’s Terrorism and This magazine was designed in collaboration Homeland Security Committee members for with FireRescue1 and the International their input. Association of Fire Chiefs (IAFC). IAFC represents the leadership of firefighters For questions, comments, submission and emergency responders worldwide. IAFC guidelines, or requests for print copies of this members are the world’s leading experts publication, email [email protected]. in firefighting, emergency medical services, terrorism response, hazardous response, Executive Editor: Leischen Kranick natural disasters, search and rescue, and Assistant Editor: Jinnie Chua public safety legislation. Since 1873, the IAFC 3 Protecting Against Cyberattacks SECTION 1: VULNERABILITY TO CYBERATTACKS Agencies Under Cyberattack: Staying Ahead of the Hackers Government agencies are conducting more and more services online, but they are struggling to stay ahead of hackers trying to steal valuable personal information. This expansion and availability of PCs By Dr. Harry Cooper, Faculty Member, spurred the 1993 National Partnership for Cybersecurity and Information Technology, Reinventing Government (NPR), which was American Military University launched during the Clinton administration to review and reform how the government delivered services in the 21st century. It is The launch of personal computers (PCs) through the NPR that government agencies has significantly changed our world during redesigned their processes, enabling basic the past three decades. Computers, tasks—such as electronic benefits transfer, once restricted to use by corporations or access to government information, creation of government agencies, became accessible for a national law enforcement network, and filing use in the home. taxes—to go from lengthy in-person processes to simpler online processes. Protecting Against Cyberattacks 4 From these humble beginnings, government Unfortunately, the government was forced services at all levels have drastically evolved. to play catch-up, as there was no federal law Today, almost all services handled by in place to prosecute such computer crimes. government can be accessed and It was not until 1986 that the Computer completed online. Fraud and Abuse Act was passed. Legislation continues to struggle to keep up with While this level of access is a great step technology. While numerous amendments toward bringing the government closer to its have been made to the Computer Fraud and constituents, it is not without significant flaws. Abuse Act over the past 30 years, it has not These flaws include government employees been enough to deter hackers, hacktivists, failing to adhere to policies and procedures phishers, scammers, nation-states, and many or not receiving proper training, both of others from committing acts of cybercrime. which can lead to compromised network systems. There is also a lack of proper funding for technology, security upgrades, About the Author and initiatives to protect systems, resulting Dr. Harry Cooper is an instructor in the STEM school at in potentially large breaches of improperly American Military University, focusing on cybersecurity secured information. and information technology with experience in both academics and as a practitioner. Dr. Cooper has Government Failing to Keep Up taught at various colleges and universities on a wide range of technology topics. Before entering academia, with Technology Dr. Cooper served as CEO/partner for Thimbleweed One of the earliest “hacks” against government Consulting and TWC Security. Dr. Cooper received took place in 1983 against the Los Alamos his D.Sc. in Cybersecurity from Capitol Technology University, where his research focused on the Mosaic National Laboratory by a hacker group called Theory of Intelligence, its role in today’s society, and “The 414s.” The 414s were six teenagers who how it has become available to most average users. He became some of the first “famous” hackers. also completed his M.S. in cybersecurity, intelligence, Part of their fame has been attributed to the and forensics at Utica College and his B.A. in political same-year release of WarGames, a film about science at the University of Pittsburgh. a teenager nearly launching World War III by unknowingly hacking into North American Aerospace Defense Command (NORAD). 5 Protecting Against Cyberattacks SECTION 1: VULNERABILITY TO CYBERATTACKS TERMINOLOGY TO KNOW Attack Encryption key An attempt to gain unauthorized access to A random string of bits created explicitly system services, resources, or information, for scrambling and unscrambling data. or an attempt to compromise system Encryption keys are designed with integrity. algorithms intended to ensure that every key is unpredictable and unique. Authentication The process or action of verifying the Firewall identity of a user or process. Hardware or software designed to prevent unauthorized access to a computer or Bot network from another computer or A computer connected to the internet network. that has been surreptitiously or secretly compromised with malicious logic to Hacker perform activities under the command and Someone who violates computer security control of a remote administrator. for malicious reasons, kudos, or personal gain. Encryption The transformation of data to hide its Malware information content. Software intended to infiltrate and damage or disable computers; shortened form of malicious software. Protecting Against Cyberattacks 6 Pharming Spyware A cyberattack intended to redirect a Malware that passes information about a website’s traffic to another, fake site. computer user’s activities to an external party. Phishing Method used by criminals to try to obtain Trojan financial or other confidential information A computer program that appears to have (including usernames and passwords) a useful function, but also has a hidden from internet users, usually by sending an and potentially malicious function that email that looks as though it has been sent evades security