Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

OUR NATION’S CRITICAL INFRASTRUCTURE

IS FUELED BY THE INTERNET


GOVERRMENT DEFENSE
FACILITIES INDUSTRIAL BASE

TRANSPORTATION
COMMERCIAL FACILITIES

FOOD & AGRICULTURE

DAMS
CRITICAL
MANUFACTURING
EMERGENCY
NUCLEAR REACTORS,
SERVICES
MATERIALS
HEALTHCARE & WASTE
& PUBLIC HEALTH COMMUNICATIONS

CHEMICAL
WATER &
WATER SYSTEMS

ENERGY INFORMATION
TECHNOLOGY

FINANCIAL SERVICES

What is critical infrastructure?


Critical infrastructure describes the physical and cyber systems and assets that are so vital to the United States that their incapacity or destruction
would have a debilitating impact on our physical or economic security or public health or safety. The Nation's critical infrastructure provides the
essential services that underpin American society.

HOW DO YOU ENGAGE WITH CRITICAL


INFRASTRUCTURE ONLINE?

ONLINE BANKING

ORDERING MEDICATION ONLINE WITH


A MEDICAL INSURANCE PROVIDER

TRUCKERS, ENGINEERS, CHEMISTS,


VEHICLE MANUFACTURERS,
POLITICIANS AND MORE...
all touch our nation’s critical infrastructure
via the Internet when they connect to their
company’s network.

NOVEMBER IS NATIONAL CRITICAL INFRASTRUCTURE Every one of us has a


SECURITY & RESILIENCE MONTH role, whether it is
Infrastructure Security Month is a time to shine a light on the vital role that critical investing in resilience,
infrastructure systems and places play in keeping the nation and our communities making preparedness
safe, secure and prosperous. plans—and exercising
those plans, or simply
saying something when
Learn more and participate here:
you see something that
https://www.cisa.gov/infrastructure-security-month
looks suspicious.

Connect safely. It’s OUR SHARED RESPONSIBILITY.

TIPS PROTECT YOURSELF & OUR NATION’S CRITICAL INFRASTRUCTURE

KEEP A CLEAN MACHINE.


Having the latest security software, web browser, and operating system are
the best defenses against viruses, malware, and other online threats.

TURN ON TWO-FACTOR AUTHENTICATION


Use a username and password and another form of identification, often
times a security code. Some examples are voice ID, facial recognition,
iris recognition and fingerscanning.

WHEN IN DOUBT, THROW IT OUT.


Links in email, tweets, posts, and online advertising are often the way
cybercriminals compromise your computer. If it looks suspicious, even if
you know the source, it’s best to delete or, if appropriate, mark as junk email.

PROTECT ALL DEVICES


THAT CONNECT TO THE INTERNET
Including computers, smart phones, and all Internet of Things (IoT)
devices

Learn more at www.staysafeonline.org

You might also like