Cyber Resilience: A Review of Critical National Infrastructure and Cyber-Security Protection Measures Applied in the UK and USA

Wayne Harrop, Ashley Ross Matteson

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

Imagine a future world held to ransom by the demands of a hidden unnamed force lurking behind computer screens and operating in murky shadows. Imagine the same forces causing indiscriminate and lasting harm in an ever-increasing technologically dependent world. A world where a private GPS or home smart meters could be hacked and reprogrammed remotely without the owner’s permission or knowledge; where financial systems might unexpectedly suffer malicious downtime; where ICT systems are hacked to steal highly confidential information or intellectual property; where power grids are interfered with, water treatment plants remotely breached and attacked by digital terrorists and cyber activists, and public transportation networks (ICT systems) targeted to cause maximum chaos during peak travel periods. Maybe this all sounds like another Hollywood blockbuster movie. However, consider the alternative that it is a real prospect. If so, what can be done to safeguard the basic way of life? In particular, what is being done by countries like the UK and USA to safeguard the security people have come to expect and enjoy but may take for granted?

https://link.springer.com/chapter/10.1057/9781137455550_10
Original languageEnglish
Title of host publicationCurrent and Emerging Trends in Cyber Operations
Subtitle of host publicationPolicy, Strategy and Practice
EditorsFrederic Lemieux
PublisherSpringer
Pages149
Number of pages18
ISBN (Electronic)978-1-337-45555-0
ISBN (Print)978-1-349-55783-7
Publication statusPublished - 15 Jun 2015

Publication series

NamePalgrave Studies in Cybercrime and Cybersecurity
PublisherSpringer

Keywords

  • Cyber Resilience
  • Cyber Security
  • Critical National Infrastructure
  • stuxnet
  • Computer virus

Fingerprint

Dive into the research topics of 'Cyber Resilience: A Review of Critical National Infrastructure and Cyber-Security Protection Measures Applied in the UK and USA'. Together they form a unique fingerprint.

Cite this