The Islamic State of Iraq and Syria that is also known as the Islamic state of Iraq and the Levant is a terrorist organization that has caused a state of panic and tension to several people. The terror group is familiar to several people due to its beheading and abduction of both civilians such as journalists and other people as well as soldiers. The ISIS became popular after its activities leading to the departure of Iraqi forces from different cities in the western parts of the country of Iraq (Pagliery, 2015). The militia group has posed several challenges to several groups in regards to the security conditions in diverse countries. Although the Islamic state of Iraq and Syria has led to raising of an alarm by the United Nations organization, the United States of America is at crossroads about its critical infrastructure as far as the militia group is concerned. The presence of ISIS poses a serious challenge to the United States, nuclear energy production activities as well as the critical production of renewables (The United Nations, 2017). Nevertheless, the methods the ISIS is likely to adopt and the proper measures of combating the mechanisms employed to curb their strategy pose a challenge to the USA.
Method the ISIS Could Use in Relation to Critical Infrastructure
Whereas several countries such as the United States of America and humanitarian organizations are puzzled by the cruel nature of the ISIS, the militia group has several tactics of destroying the critical infrastructure. The ISIS would heavily depend on cyberattacks. It would be visible through hacking of different sites and software on the United States’ critical infrastructure (Knake, 2017). Although the militia group has various methods such as security intrusion, the ISIS the cyberattack in a bid to derail the critical infrastructure and development of renewable energy in several countries, especially the United States, is an adequate method for easier acquisition of detailed information (Steel, 2017).
The cyberattacks as a measure of harming the energy producing critical infrastructure in the United States have several disadvantages to the country under consideration. Cyberattack involves the use of cyber weapons to break into the databases of different companies and government bodies with the aim of stealing vital information as well as destroying the already stored relevant information (Paganini, 2016). The reason behind the destruction of the necessary information is preventing the organization or the government body from coordinating their activities while using that information. Moreover, the data gained through cyberattack may relate to the intended goals and plans as far as critical infrastructure is concerned. As a result, accessing the information may necessitate the ISIS to plan various mechanisms of ensuring the intended plans are not implemented (Vella, 2017).
Protecting the Critical Information from Cyber Attack
The increasing number of cyberattacks is alarming; for homeland security professional, application of the ITIL model that enables an individual to determine the area exploited by the attacker is vital. The ITIL model involves identification, logging, categorization, prioritization, diagnosis, resolution, closure, and communication (Barnes, 2015). The design would play a significant role in determining the content or information the attackers were searching. The ITIL model is important in identifying cases of vulnerability on the cyberattacks (Paganini, 2016). Moreover, there should be improvements in the manner, in which information on cyber threats and vulnerabilities between different state agencies plays a significant role in barring instances of cyber exploitation (Assante, 2015). Engagement of entities that operate on their own for example those undertaking their activities independently from the federal government is essential in increasing the protection efforts as far as critical infrastructure is concerned. As homeland security personnel, developing a comprehensive yet a well-coordinated national plan about critical infrastructure is pivotal in ensuring the loopholes subject to exploitation by the ISIS are eradicated, if not reduced to a greater extent (Choras, 2017).
Impacts of Cyberattack on Nuclear and Renewable Energy and Modes of Mitigating such Disasters
Power whether nuclear or renewable plays a significant role in the day to day activities in the world. The cyberattack will have an adverse impact on the programmable logic controller (PLC) that is the brainbox of several systems and activities that take place both in air, sea, and on land. If the PLC is fully computerized, it ends up controlling several activities both at household and technical levels such as pumping of gasoline, lighting, and other commercial and industrial operations (King, 2012). As a result, in the event, where the ISIS makes a cyberattack on nuclear and renewable energy, the day-to-day routine activities that involve utilization of power will stop. The attack would paralyze several economic activities not only in the United States of America, but also to the entire world since several products developed and manufactured in the USA are exported to diverse countries (Pagliery, 2015).
Since the nuclear and renewable energy plays an essential role in street lighting, the United States of America is bound to experience traffic jam for a relatively extended period of time. As a way of mitigating the effects of a cyberattack on nuclear and renewable energy, the Homeland Security should ensure it does not make rush-decisions so as to revenge or having an immediate counterattack (The United Nations, 2017). Instead, the security firm should ensure the situation is contained so as to limit chances of recurrence. Moreover, sanctions should be placed on the people or countries involved in the attack. The United States can use the international law enforcement agencies to ensure the arrest of the culprits (Vella, 2017).
Assante, M. (2015, January 2). Cyber Threats Proving Their Power over Power Plant Operational Technology. Retrieved from Power: http://www.powermag.com/cyber-threats-proving-their-power-over-power-plant-operational-technology/
Barnes, W. A. (2015, January 1). Protecting the Nation’s Critical Infrastructure from Cyber Attack . Retrieved from Signal: https://www.afcea.org/content/?q=node/13838
Choras, M. K. (2017). Cyber Threats Impacting Critical Infrastructures. Springer, 139-161.
King, L. (2012, July 10). The Devastating Effects of a Cyber-Attack Against a Country’s Energy Grid. Retrieved from Oilprice: http://oilprice.com/Energy/Energy-General/The-Devastating-Effects-of-a-Cyberattack-Against-a-Countries-Energy-Grid.html
Knake, R. K. (2017, April 3). A Cyberattack on the U.S. Power Grid. Retrieved from Council on Foreign Relations : https://www.cfr.org/report/cyberattack-us-power-grid
Paganini, P. (2016, February 15). Why protecting critical infrastructure from cyberattacks is a global emergency. Retrieved from Fox News: http://www.foxnews.com/tech/2016/02/15/why-protecting-critical-infrastructure-from-cyberattacks-is-global-emergency.html
Pagliery, J. (2015, October 16). ISIS is attacking the U.S. energy grid (and failing). Retrieved from Cnn: http://money.cnn.com/2015/10/15/technology/isis-energy-grid/index.html
Steel, W. (2017, April 10). Heeding the Call for Cybersecurity in the Renewable Energy Sector. Retrieved from World Renewable Energy: http://www.renewableenergyworld.com/articles/2017/04/heeding-the-call-for-cybersecurity-in-the-renewable-energy-sector.html
The United Nations. (2017, February 13). Security Council Calls on Member States to Address Threats against Critical Infrastructure, Unanimously Adopting Resolution 2341 (2017). Retrieved from United Nations: https://www.un.org/press/en/2017/sc12714.doc.htm
Vella, H. (2017, May 19). Cyber Attacks in the Energy Industry: Don’t Become a Victim. Retrieved from Transform: https://www.gepower.com/transform/article.transform.articles.2017.may.cyber-attacks-in-the-energy-industry–don-t-become-a-victim-.html#