Imagine a future world held to ransom by the demands of a hidden unnamed force lurking behind computer screens and operating in murky shadows. Imagine the same forces causing indiscriminate and lasting harm in an ever-increasing technologically dependent world. A world where a private GPS or home smart meters could be hacked and reprogrammed remotely without the owner’s permission or knowledge; where financial systems might unexpectedly suffer malicious downtime; where ICT systems are hacked to steal highly confidential information or intellectual property; where power grids are interfered with, water treatment plants remotely breached and attacked by digital terrorists and cyber activists, and public transportation networks (ICT systems) targeted to cause maximum chaos during peak travel periods. Maybe this all sounds like another Hollywood blockbuster movie. However, consider the alternative that it is a real prospect. If so, what can be done to safeguard the basic way of life? In particular, what is being done by countries like the UK and USA to safeguard the security people have come to expect and enjoy but may take for granted?
|Title of host publication||Current and Emerging Trends in Cyber Operations|
|Subtitle of host publication||Policy, Strategy and Practice|
|Number of pages||18|
|Publication status||Published - 15 Jun 2015|
|Name||Palgrave Studies in Cybercrime and Cybersecurity|
- Cyber Resilience
- Cyber Security
- Critical National Infrastructure
- Computer virus
Harrop, W., & Matteson, A. R. (2015). Cyber Resilience: A Review of Critical National Infrastructure and Cyber-Security Protection Measures Applied in the UK and USA. In F. Lemieux (Ed.), Current and Emerging Trends in Cyber Operations: Policy, Strategy and Practice (pp. 149). [ISBN: 978-1-349-55783-7] (Palgrave Studies in Cybercrime and Cybersecurity). Springer.