Current scenarios reveal new types of ever increasing dynamic and aggressive threats, which lead to a move from a traditional security management to a strategic vision for protecting citizens and assets in a more comprehensive way. In such an environment, the risk related to incidents involving the use of CBRN (Chemical, Biological, Radiological and Nuclear) agents must be considered a cause of potentially devastating consequences. Non-proliferation and disarmament operations can make an essential contribution to combat terrorism by preventing or reducing the access of non-state actors or non-authorised persons to chemicals, biological and nuclear dual-use materials but this could be not enough. Illicit proliferation of chemical weapons, clandestine production of toxins and biological agents, ‘dirty bombs’ and trafficking of fissile material are just some examples of the use of CBRN agents for terrorist purposes. This chapter argues that, in order to address these issues, the integration of human, instrumental, technological and financial resources should be improved and reinforced. For that purpose, an effective strategy to mitigate and reduce the risk of using CBRN materials requires a high level of coordination across national agencies. Further development of interagency CBRN defence capabilities remains a top priority for global security.
As cyberattacks are becoming the prevalent types of attacks on critical infrastructures, due protection and effective response are crucial in CBRN facilities. This article explores comprehensive cyber security vulnerability management related to CBRN Control Systems and Industrial Control Systems (ICS) and provides recommendations that will increase CBRN operational cyber security and ensure further platform for the research in the field of operational vulnerability detection and remediation. The article reviews several key issues related to ICS vulnerability management cycle, vulnerability sharing with security developers, patch and network management, cyber offensive threats and threat actors and related cyber security challenges. It covers such specific issues as ICS connectivity to private/public networks, critical ICS accessibility via Web Access, Wi-Fi and/or unauthorised software inside corporate networks. The proposed solutions refer to some areas of vulnerability management for the awareness and development of countermeasures.
As cyberattacks are becoming the prevalent types of attacks on critical infrastructures, due protection and effective response are crucial in CBRN facilities. This article explores comprehensive cyber security vulnerability management related to CBRN Control Systems and Industrial Control Systems (ICS) and provides recommendations that will increase CBRN operational cyber security and ensure further platform for the research in the field of operational vulnerability detection and remediation. The article reviews several key issues related to ICS vulnerability management cycle, vulnerability sharing with security developers, patch and network management, cyber offensive threats and threat actors and related cyber security challenges. It covers such specific issues as ICS connectivity to private/public networks, critical ICS accessibility via Web Access, Wi-Fi and/or unauthorised software inside corporate networks. The proposed solutions refer to some areas of vulnerability management for the awareness and development of countermeasures.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.