1 / 3

STRATEGIC INTELLIGENCE MANAGEMENT

STRATEGIC INTELLIGENCE MANAGEMENT. Chapter 20 - Cyber Security Countermeasures to Combat Cyber Terrorism, Pg. 234 . Chapter by Lachlan MacKinnon, Liz Bacon, Diane Gan , Georgios Loukas, David Chadwick, Dimitrios Frangiskatos. Section 4: Future Threats and Cyber Security .

wyome
Download Presentation

STRATEGIC INTELLIGENCE MANAGEMENT

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. STRATEGIC INTELLIGENCE MANAGEMENT Chapter 20 - Cyber Security Countermeasures to Combat Cyber Terrorism, Pg. 234 Chapter by Lachlan MacKinnon, Liz Bacon, Diane Gan, Georgios Loukas, David Chadwick, Dimitrios Frangiskatos

  2. Section 4: Future Threats and Cyber Security 20. Cyber Security Countermeasures to Combat Cyber Terrorism, Pg. 234 • In this chapter we first consider what constitutes cyber terrorism, to distinguish such events from other forms of cybercrime, and to establish a rationale for that distinction. We discuss some of the characteristics of cyber terrorist events in comparison with cybercriminal events, and the changes that have occurred, socially and technologically, that make such events both more likely and more damaging. We then go on to consider three key aspects of cyber terrorist attacks, cyber attacks on physical systems, malware specifically developed for such attacks, and insider threats to enable or support such attacks. • Next, we look at the countermeasures that can be adopted by organizations and individuals to address such threats, highlighting the significant human component of such systems through the need for standards-based policies and protocols, good security hygiene, and the training of system users at all levels. We also consider some issues of physical systems upgrade, and some software measures that can be used to identify and isolate cyber threats. Finally, we consider the future in terms of the likely further growth of cyber terrorist events, and the threat they pose to critical infrastructure and the systems on which, socially and technologically, we increasingly rely.

  3. Section 4: Future Threats and Cyber Security 20. Cyber Security Countermeasures to Combat Cyber Terrorism, Pg. 234 Table 20.1 (adjacent) provides a framework, based on the information provided in this chapter, to address issues of cyber security, with specific reference to cyber terrorism, in any organizational system.

More Related