Protecting agriculture critical infrastructure

Assignment Help Business Management
Reference no: EM131044188

Protecting Agriculture Critical Infrastructure

Vulnerabilities are only weak spots when they are abused. According to multiple government reports, professional criminals and state actors have become a serious risk for business and governments22. Criminals become more professional and have more equipment and tooling to execute cyber hacks. Data, money and other valuable assets such as intellectual property, confidential business data, personal information and the continuity and integrity of digital processes can be abused by malicious actors.

A secure chain is only as strong as the weakest link

Challenges are not only visible on an organizational level, but are strongly chain focused. The agrifood sector is operating in chains or networks and is dependable on other chain organizations or third parties. Some risks are obscured and/or displaced outside an organization's span of control. A secure organization, chain and network are therefore a shared responsibility. When managing the risks of the whole chain,

it is important to identify not only the physical chain, but also the "digital chain". This chain effect has been proven in other sectors by, for example, the disruptions that occurred some time ago by DDoS attacks on Dutch banks, government departments such as DigiD23 and - when it comes to system failures - the power failures in Noord- Holland24. The impact of a non-functioning chain is exceptionally high and costly25.

A secure chain is only as strong as the weakest link.

A successful cybersecurity attack can have major impact, not only on the IT side but especially on the business. Some consequences are loss of reputation or loss of business due to system downtime (for example costs of not-harvesting). For an organization to take control, it has to ask itself: Are our digital "crown jewels" and reputation adequately protected and under control? And if my system fails, is my business resilient enough to recover?

Total security is an illusion and in most cases impossible to achieve, due to the substantial impact security measures can have on society and individuals. To find the balance in security, freedom, social and economic growth has become a challenge nowadays. We can combine digital innovation and transformation within acceptable risks. To cope with these vulnerabilities and threats, multiple technical solutions or standards can help to mitigate threats and risks. But improving cooperation - both internal and external at various levels - by sharing knowledge, expertise and expe- riences is one of the basics in developing cybersecurity resilience in the organization and the agrifood chain.

Agrifood processes not considered "vital" by government

In 2010 the Dutch government labeled several sectors as being "vital". In 2015

this process was repeated but now from the perspective of vital processes instead of vital sectors. This time agrifood processes were not labeled as vital. They were assessed as being too fragmented and therefore incapable of disrupting society or the economy. But how much impact does it have when processes for assuring food quality and food production seem vulnerable to cyber threats? Is this assessment changing with the fast digitalization of the food chain? When a shortage in crops

or unreliable quality manifests, societal unrest arises. But when vulnerabilities and outages of continuity become reality, the food production processes and geographic distribution of the products will show to have a great level of resilience due to the vast networks of the food supply chain. No branch of the food chain will be threatened

as a result of outages in the major food production locations. Moreover, when food supply is thin, products can be replaced by similar or alternative products to balance the shortage. This is why food production and distribution processes are not catego- rized as "vital infrastructure" by the Dutch government (2015).

But the vulnerabilities of the (digital) food supply chain is more and more dependable on other products and services that are labeled as "vital", of which the most important ones are drinking water, energy en transport. Besides continuity and security of food supply, food safety and quality control are vital pillars of the food business. But what happens when fraud is committed? Our attention has been drawn to the fact that there is no information on how little attention there is for cybersecurity as a consolidating factor in data on quality of produced food in an ever digitalizing chain26.

Agrifood businesses struggle with cyber security measures Agrifoodcompaniess support27 the view that digital data exchange is increasing in the agrifood sector. They mention not only technology as a main driver, but also the growing need for traceability, increasing need of customers and consumers for information on sustainability and further globalization of our food supply chains.

Indeed, data is considered as a valuable asset for companies in the agrifood sector. Farm data is seen as farmers' new product alongside its crops and animals, and needs appropriate security.

According to the companies interviewed, sensitive data in the agrifood sector particularly concerns business data, being valuable information for the market and its competitors. For instance food product prescriptions but also plans for take-over are considered as market-sensitive data. And for each food supply chain (dairy, meat, vegetables etc.) in the agrifood sector the risks and vulnerabilities will be different. Cyber attacks by hacktivists in order to damage the reputation of companies are seen as an increased threat. Also the increase of extortion was named in which firm data is taking hostage.

Some businesses wonder whether the agrifood sector has sufficient awareness of cybersecurity compared to other sectors. It seems that awareness in the IT and software companies as service provider of the agrifood sector, is high enough. And large food enterprises (especially multinationals) also seem to be reasonably aware of cybersecurity. Also due to their accountancy firms that carry out risk assessments and impose arrangements to meet cybercrime attacks. And also because of the new stricter privacy and data protection regulation with the obligation for data controllers to notify data breaches and higher fines.

So how should the agrifood sector deal with cybersecurity taking into account that a lot of agrifood chains operate in an international environment, crossing borders, and dealing with different legislation? Also the different cultural biases and legal systems between US, Europe and Asia on cybercrime should be taken into account. Opinions vary on how a joint approach should look like. Who should take responsibility, who will organize it and who should be involved? The large and more powerful companies in the agrifood sector such as multinationals or European purchasing alliances of the supermarket groups? And how will the costs and benefits be divided among the involved parties along the food supply chain?

Reference no: EM131044188

Questions Cloud

Evaluate the health of a company : Financial ratios are widely used in Finance to evaluate the health of a company. Discuss the broad categories of financial ratios. Give examples of each. Discuss limitations if any.
Assessment methods for its special agent positions : The FBI is one of the six bureaus of the U.S. Department of Justice and the primary criminal investigative agency of the federal government. The special agents who work for the FBI investigate people and organizations that violate federal statutes..
Write a three pages essay about benjamin franklin : Write a three pages essay about Benjamin Franklin.
Difference between forward contract price and future price : A futures contract expiring in April on Mexican pesos is available now for $.08 per unit. Also, a forward contracts is available for the same settlement date at a price of $.085 per peso. How could speculators capitalize on this situation, assuming z..
Protecting agriculture critical infrastructure : Vulnerabilities are only weak spots when they are abused. According to multiple government reports, professional criminals and state actors have become a serious risk for business and governments22. Criminals become more professional and have more..
Essay identify some of the post modern trends movement : Essay Identify some of the post modern trends movement that womrn artist have participate women. Sonia Delaunary embraces cubism with her piece entitled.
Advertising emphasized in consumer markets : What are some problems that a firm might face when undertaking a major restructuring of its sales organization? Why is personal selling typically emphasized in business markets and advertising emphasized in consumer markets? In consultative selling, ..
Job description and recruiting strategies worksheet : Conduct an interview with someone who has a career or position that is different from your own. Identify the duties associated with his or her position, as well as any skills and abilities necessary for the position. Use the information gathered i..
The yield rate on a one year zero-coupon bond is currently : The yield rate on a one year zero-coupon bond is currently 7% and the yield rate on a 2 year zero coupon is currently 8%. The treasury plans to issue a two year bond with a 9% annual coupon, maturing at $100 par value. Determine the yield to maturity..

Reviews

Write a Review

Business Management Questions & Answers

  Target market segment

Suppose that a business researcher is attempting to estimate the amount that members of a target segment spend annually on detergent and wants to use a Z-value of 1.96.

  Developing leadership in global organizations

Share a current event article with the class that relates to the concepts covered in this week's reading. Write a brief summary, and explain why you felt the article was relevant. We are reading about ..... Chapter 8: Developing Leadership in Glob..

  Ways that hr leaders can build culture in an environment

Show the ways that HR leaders can build culture in an environment -  The purpose of this environment is to capture the talents, skills, and knowledge of all employees.

  What will be technologys role in the future of security

Does it have any contingency plans, and if so, what for? If not, what should it have contingency plans for, that is, fire, flooding, earthquakes, and so on, and what are some measures you would recommend?

  Advice to a prospective expatriate questions to ask before

advice to a prospective expatriate questions to ask before accepting the assignmentwhat advice would you give to a

  Approaches to new product design

What circumstances might a market-pull approach or a technology-push approach to a new-product design be the best approach?

  How will you select the sample of research participants

How many groups, interviews or case studies would you recommend? How will you select the sample of research participants? Location - i.e. where should the interviews /groups be conducted?

  Leading design functional role expectations strategy and

leading design functional role expectations strategy and shaping by a leader1. identify an organization and its leader

  Information related to reputation managementthe practice of

information related to reputation managementthe practice of caring for the image of a firm is sometimes referred to as

  Create a high-tech web site for small business

Describe a work-related situation you feel could be improved. For example, you want to streamline the process for reimbursing employees, or you want to create a high-tech Web site for your small business but have no experience in programming or graph..

  Deliberate maria''s liability

Maria receives the bills for these charges as well as refuses to pay them. Deliberate Maria's liability in these situations

  Explain what is diversity

Explain what is diversity and how important is a definition of diversity for managers and companies and how much does it need to change, if at all, as we move from company to company, go across borders, or operate as a multi-national organization?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd