Prof. Huergo, Elizabeth
ENGL 101A 40238
June 30 2018
Climate Change and Cyber Security
Climate change and cybersecurity are two threats that worry every government in the world. Dealing with these two issues also need individuals to be involved and not just the governments. Cybersecurity is a widespread threat to online activity and global security in general but awareness about it is very minimal (Randle, 89-190.) Almost everybody knows a thing or two about cyber security but is not truly aware of the seriousness of it. Internet users may think that the internet is a safe place to share information, control the physical world and do transactions but far from it, cyber wars are continuing and users ought to be prepared. The incapacity to outline cybersecurity has led to the failure to formulate proper policies. Cybersecurity can be fostered by creating awareness and making policies that curb the threat. On the other hand, climate change is the increase in the general surface temperature of the world and can be manifested through rising sea levels, droughts, wildfires and severe weather events. Scientists agree that human activity is the primary cause of climate change (Allen, 22-38.) There is a small number of people who do not believe that climate change is a real occurrence and often probe the legitimacy of those claims, choosing to throw doubt on the multitude of evidence. They claim that one weather activity, for example, a hurricane cannot be directly connected to global warming. Even though it might be true, data gathered over several decades point to climate change and the involvement of humans in it. Climate change and cyber security are very alike in nature but are they connected? Several parallels exist between climate change threats to critical infrastructure and information risk. The correlation can assist companies to come up with successful cybersecurity policies. In the virtual space, firewalls, computer servers, routers and related technology rest at the utmost border, or edge, of a secure computer network. These cyber tools create a borderline between susceptible internal sources and external networks, and hackers time and again concentrate on getting through these perimeter devices. For instance, when cyber-attacks at the network application level are successful, they can go around the perimeter security offered by a network firewall, router, and server. Likewise, threats that come about as a result of climate change, which is similarly multi-layered and complex in type, can bypass conventional, simplistic, perimeter-focused cyber-security approaches.
We can offer to understand into successfully identifying, thwarting and countering the cyber-security menaces by extracting links between how climate change gives rise to the risk of critical infrastructure and how hackers endanger organization data. An actual example for recognizing the effects of multifaceted cyber threats is a rainstorm water surge. A...