Abstract
Imagine a future world held to ransom by the demands of a hidden unnamed force lurking behind computer screens and operating in murky shadows. Imagine the same forces causing indiscriminate and lasting harm in an ever-increasing technologically dependent world. A world where a private GPS or home smart meters could be hacked and reprogrammed remotely without the owner’s permission or knowledge; where financial systems might unexpectedly suffer malicious downtime; where ICT systems are hacked to steal highly confidential information or intellectual property; where power grids are interfered with, water treatment plants remotely breached and attacked by digital terrorists and cyber activists, and public transportation networks (ICT systems) targeted to cause maximum chaos during peak travel periods. Maybe this all sounds like another Hollywood blockbuster movie. However, consider the alternative that it is a real prospect. If so, what can be done to safeguard the basic way of life? In particular, what is being done by countries like the UK and USA to safeguard the security people have come to expect and enjoy but may take for granted?
https://link.springer.com/chapter/10.1057/9781137455550_10
https://link.springer.com/chapter/10.1057/9781137455550_10
Original language | English |
---|---|
Title of host publication | Current and Emerging Trends in Cyber Operations |
Subtitle of host publication | Policy, Strategy and Practice |
Editors | Frederic Lemieux |
Publisher | Springer |
Pages | 149 |
Number of pages | 18 |
ISBN (Electronic) | 978-1-337-45555-0 |
ISBN (Print) | 978-1-349-55783-7 |
Publication status | Published - 15 Jun 2015 |
Publication series
Name | Palgrave Studies in Cybercrime and Cybersecurity |
---|---|
Publisher | Springer |
Keywords
- Cyber Resilience
- Cyber Security
- Critical National Infrastructure
- stuxnet
- Computer virus