An attack on a region’s fresh water supply system could residents without a safe and reliable water supply, and in the case of wastewater, widespread contamination.
Securing Public Water Systems
Remote access to water systems’ ICSs often make up major vulnerabilities, as they could serve as breach entry points for hackers. What’s worse, exploiting ICSs’ remote access capability can be trivially easy, even for an unsophisticated hacker.
Securing a public water system doesn’t happen overnight. It is a phased transition, which needs to start with a thorough ICS security assessment, which includes an inventory of ICS hardware and software components and an ICS risk assessment to determine the most critical and vulnerable components.