Page 9 - Cybersecurity Career Guide for ND
P. 9

s s
In May 20 to the data etworks
of Co into the data networks
I   h b l n company that supplies gas
h   o e
hac .
c d
huge huge numbers of business-
critical files, and demanded
e
the de the decryption key.
Not only did this ransom-
y
liv s,
it it also consumed the work
-
sand ,  ,  t
h .
c .
c s
In Ma   i D criminal
group operating
out of Russia. The hackers
then send Colonial Pipeline
e their network, but it operates
y sl MAY 8: Damage
Assessment
The communications team
ce the attack to news organi-
zations. All departments
.
c can still function and which
cannot. Colonial Pipeline
employees engage with law
enforcement, government
agencies involved with the
energy industry, and clients
and customers suddenly cut
off from gasoline supplies.
The shutdown causes major
s  st  offline. Everyone’s job –
from billing to administra-
tion to communications
be .
c ou they are supposed to do
without fully functioning
computer networks. The
he  e
cr e
F FBI, Colonial
Pipeline crisis and response
e
cr 4:45 A.M. An employee at
Colonial Pipeline discovers
    stem
i or says that hackers have taken
files from the company’s data
and  m li for the files.
5:55 A.M. The company de-
cides to shut down the entire
pipeline network to contain
ic harm or damage.
n pipeline shutdown, systems
throughout the company go
COM CYBERSECURITY VARGANES
14 1 HOT  AND MAP COURTESY COLONIAL PIP PI LI E TOP T OT OT NG 

































   7   8   9   10   11