Page 8 - Security Today, March/April 2025
P. 8
C R I T I C A L I N F R A S T R U C T U R E
From the Most Visible
to the Less Apparent
By Guerry Bruner
structure Security Agency
The Cybersecurity and Infra-
(CISA) states “There are 16
critical infrastructure sec-
tors whose assets, systems,
and networks, whether physical or vir-
tual, are considered so vital to the United
States that their incapacitation or destruc-
tion would have a debilitating effect on
security, national economic security, and
national public health or safety or any
combination thereof.”
Of the ones CISA lists people are likely
most concerned about communications, in-
formation technology (IT), emergency ser-
vices, healthcare, energy, fi nancial services,
transportation systems and commercial facil-
ities such as sports and entertainment venues.
After all, these tend to be the sectors
we personally rely on most or frequent
regularly. They’re also among those we in-
stantly hear about whenever there’s break-
ing news surrounding a cyberthreat, natu-
ral disaster, attack, or other disruption.
aerogondo/stock.adobe.com
“There are 16 critical infrastructure sectors whose
assets, systems, and networks, whether physical
or virtual, are considered so vital to the United
States that their incapacitation or destruction
would have a debilitating effect on security,
national economic security, and national public
health or safety or any combination thereof.”
MANNED AND UNMANNED
Critical infrastructure facilities can be
staffed or unmanned. Manned locations
include airports, data centers, and hospi-
tals that have readily visible onsite security
staff and video surveillance cameras, as
well as added monitoring technology and
robust access control protocols.
These sectors often fortify perimeters
with sturdy yet attractive bollards and fenc-
es to deter vehicle intrusions. In the case of
enterprise and collocation data centers, re-
inforced concrete exteriors and storm-rated
doors can also be common depending on
data sensitivity and whether sites are prone
to natural disasters and other factors. Even
with hardened spaces and robust screening,
there is always the possibility of security
gaps that need to be fi lled.
The healthcare industry, for instance,
has been forced to add more stringent steps
to counteract the costly ransomware and
cyber-attacks they have experienced in re-
cent years. While rare, these events are ex-
tremely serious. Healing environments are
complex enough without added security
issues. Addressing these challenges is essen-
tial to assuring well-being and confi dential
information are never compromised.
Measures and technologies for safe-
guarding critical infrastructure range from
the obvious like guards, cameras, and
scanning equipment to more discreet so-
lutions like user-friendly access credentials
for individuals.
Take advanced door security solutions
which are crucial to the safety of crewed
and unmanned sites alike. Electronic access
control, for example, now includes easy-to-
use biometrics like facial identifi cation and
mobile credentials for reliable authentica-
8 M A R C H / A P R I L tion. Both provide robust security.
The same goes for innovations in intel-
ligent key and lock systems that are being
deployed to better protect the openings of
a wide range of remote unmanned criti-
cal infrastructure, including facilities for
power generation and water quality, and
equipment for maintaining traffi c fl ow.
Most people driving our roads do not
give much thought to how traffi c lights
function. Nor do they likely notice the big
cabinets at every intersection that house
sophisticated equipment for the signals.
These expensive electronics not only con-
trol the lights, but they also connect to and
transmit data over a statewide communica-
tions network – infrastructure that could
2 0 2 5 | S E C U R I T Y T O D A Y