Cyber Risk in Critical National Infrastructure: Whitepaper

By:
Posted: 10/10/2010

In the realm of cyber security, threats are treated in isolation, analysed in separation from the actor behind the attack, or the cyber weapon that is utilised in the incident. This may have been because of a lack of resources and skills, or it may be because organisations do not see how the identity of the actor affects their tactical choices in deploying its defence, unless the attack was perpetrated internally.

To continue viewing this content please fill out the form below and become an Defence member.
Or if you're already a Defence member, sign in below to download.
Join

By entering in your information and submitting the form, you give the sponsor permission to contact you regarding their product and you agree to our User Agreement, Privacy Policy, and Cookie Policy.

By:
Posted: 10/10/2010