Assuring the security of our critical infrastructure

| July 3, 2019

article image
In Australia, the federal, state and territory governments have defined critical infrastructure as: ‘Those physical facilities, supply chains, information technologies and communication networks which, if destroyed, degraded or rendered unavailable for an extended period, would significantly impact the social or economic wellbeing of the nation, or affect Australia’s ability to conduct national defence and ensure national security.’ Critical infrastructure is an area where the cyber and physical worlds are converging—the operation of digital systems affects our physical world, and so a cyber incident can have direct and serious physical impacts on property and people. The security risks are far from just theoretical and have been known for many years. In 2001, a disgruntled ex-employee hacked the systems at a sewage treatment works run by the Maroochy Shire Council in Queensland causing the release of raw sewage into freshwater systems.

Spotlight

5G Systems GmbH

We are a private company for innovative internet experiments. Besides our experiments we consult other companies in the area of current technologies, automation, software and product development. We are focusing heavily on open-source technologies.

OTHER ARTICLES

Understand the role of infrastructure as code in DevOps

Article | February 28, 2020

Infrastructure as code plays a prominent role in enterprise DevOps shops. Use this chapter excerpt to understand why -- and to learn the basics of some common IaC tools. As technology evolves at a faster and faster pace, collaboration between teams, such as development and IT operations, becomes increasingly important to satisfy end user and business demands. DevOps aims to foster that collaboration, as well as improve application deployment times and quality. To succeed with DevOps, however, IT teams must be open to change. "DevOps is a culture different from traditional corporate cultures and requires a change in mindset, processes, and tools," writes Mikael Krief in the book Learning DevOps: The complete guide to accelerate collaboration with Jenkins, Kubernetes, Terraform and Azure DevOps.

Read More

Data Security in the Cloud Best Practices

Article | April 8, 2020

Data security in the cloud best practices include: understanding and implementing security fundamentals, securing cloud infrastructure along the shared responsibility model, encrypting data in the cloud, and ensuring compliance with applicable regulations. Data security fundamentals often come back to the CIA Triad: data confidentiality, data integrity, and data availability. The shared responsibility model refers to the idea that both a cloud provider and the organization using the cloud are responsible for ensuring the overall security of the organization’s cloud infrastructure, including the data housed there.

Read More

5 TIPS TO ENSURE NETWORK SECURITY OF INTERNAL IT INFRASTRUCTURE

Article | May 3, 2021

What Is IT Infrastructure Security? If you are reading this blog, we would like to assume that you are either an aspiring cybersecurity professional or a business owner looking for ways to improve their network security. A business IT infrastructure includes networks, software, hardware, equipment, and other facilities that make up an IT network. These networks are applied to establish, monitor, test, manage, deliver, and support IT services. So, IT infrastructure security describes the process of safeguarding the core networking infrastructure, and it is typically applied to enterprise IT environments. You can improve IT infrastructure security by installing protective solutions to block unauthorized access, theft, deletion, and data modification.

Read More

Edge computing environments: what you need to know

Article | March 24, 2020

The saying goes: “If you’re not on the edge, you’re taking up too much space”. And compute itself is now moving to the edge, forcing datacentre operators to wring the last drops of productivity from their infrastructure, ahead of a future supporting multi-sensor internet of things (IoT) devices over 5G for machine learning, and even artificial intelligence (AI). Jennifer Cooke, research director of cloud-to-edge datacentre trends at IDC, says datacentre operators need to start thinking about how many systems they will need to roll out, and the people they will need to support them. “Cost becomes the prohibitive factor,”

Read More

Spotlight

5G Systems GmbH

We are a private company for innovative internet experiments. Besides our experiments we consult other companies in the area of current technologies, automation, software and product development. We are focusing heavily on open-source technologies.

Events