When systems are shut down and tampered with by outside actors, they become inoperable, and the Coast Guard cannot carry out its mission. For example, if the navigation system of an HH-60J Jayhawk was hacked, and the GPS portrayed a completely different location, or the automated warning system in the aircraft delivered false reports that the helicopter would crash, the helicopter would become inoperable. If there was a current search and rescue case, the aircraft would not be able to save the party in question, and possibly, people would die. Looking at the greater picture, Sergio Galindo, general manager of GFI Software, commented that the many consequences of a cyber-attack are disastrous for the government and the corporations of America alike. “Usernames, passwords, credit card data, health records – malicious use of this data by criminals can quickly create financial hardship and significant stress for affected individuals, while the negative fallout for organizations the data was stolen from can range from loss of reputation to fines, falling sales, civil and criminal legal proceedings and more.” The consequences of cyber-attacks are large, therefore they must be a high priority to insure this does not
When systems are shut down and tampered with by outside actors, they become inoperable, and the Coast Guard cannot carry out its mission. For example, if the navigation system of an HH-60J Jayhawk was hacked, and the GPS portrayed a completely different location, or the automated warning system in the aircraft delivered false reports that the helicopter would crash, the helicopter would become inoperable. If there was a current search and rescue case, the aircraft would not be able to save the party in question, and possibly, people would die. Looking at the greater picture, Sergio Galindo, general manager of GFI Software, commented that the many consequences of a cyber-attack are disastrous for the government and the corporations of America alike. “Usernames, passwords, credit card data, health records – malicious use of this data by criminals can quickly create financial hardship and significant stress for affected individuals, while the negative fallout for organizations the data was stolen from can range from loss of reputation to fines, falling sales, civil and criminal legal proceedings and more.” The consequences of cyber-attacks are large, therefore they must be a high priority to insure this does not