Chapter 11: Information, Communications, and Cybersecurity

Loading audio…

ⓘ This audio and summary are simplified educational interpretations and are not a substitute for the original text.

If there is an issue with this chapter, please let us know → Contact Us

Information, Communications, and Cybersecurity establishes critical distinctions between information technology (IT) and information and communications technology (ICT) while detailing the vital role of industrial control systems (ICS), cyberphysical systems (CPS), and supervisory control and data acquisition (SCADA) systems in managing national infrastructure. The analysis identifies diverse human sources behind cyberattacks, ranging from profit-motivated criminals and hacktivists to sophisticated nation-state actors employing advanced persistent threats (APTs). A significant portion of the text is dedicated to internal risks, highlighting how authorized personnel can intentionally or accidentally compromise sensitive data. Various access vectors are examined, including malicious software like viruses and worms, social engineering tactics such as phishing, vishing, and spoofing, and the vulnerabilities inherent in cloud computing, wireless networks, and mobile devices. The chapter also delineates methods of cybersabotage, such as distributed denial of service (DDOS) attacks, logic bombs, and root kits designed to disrupt essential services. To counter these threats, the text outlines a multi-layered defense strategy involving cyberaccess controls based on the principle of least privilege, robust cyberdefense mechanisms like firewalls and intrusion-detection systems, and the legal framework for cyberdeterrence. Finally, it details the organizational structure of United States cybersecurity, highlighting the leadership of the Cybersecurity and Infrastructure Security Agency (CISA) within the Department of Homeland Security, the signals intelligence role of the National Security Agency (NSA), and the investigative mandates of the FBI and Secret Service. Looking forward, the emergence of 5G, the Internet of Things (IoT), and artificial intelligence are identified as both burgeoning attack surfaces and transformative tools for future network resilience.