28
CHAPTER 3
New and emerging threats of cyber crime and terrorism
It will activate the robots without a properly secured configuration as the
configuration handbook will only discuss robot safety issues and will not
discuss cyber security issues at length.
12.
All sectors: The next ICT innovation cycle is the Internet of Things (IOT).
Almost any device will have an internet address, communicate what it senses,
and may activate its actuators. Futurists dream about amazing new ICT
functions and bright technical people implement them. In some cases they
even inject an RFID chip under their skin to identify themselves as authorized
users of innovative ICT-based services. Once again, more elaborate thoughts
about cyber security are not in the designers’ mind set.
CONCLUSIONS
This chapter showed that earlier cyber security lessons identified about threats and
risk to current and previous ICT innovation cycles do not make their way into the
next ICT innovation cycle. The old cyber security lessons will be identified again.
Patches will be used to plug the holes in the “Swiss cheese” design.
People with the bright innovative ideas are not educated in cyber security, nei-
ther are many of the programmers who implement their ideas. They neglect the old
threats which provide attack paths to cyber criminals.
New and emerging threats can therefore be predicted as long as this innovation
cycle without proper cyber security is not broken. The only advantage is that cyber-
crime investigators can prepare themselves for the next innovation cycle by becom-
ing an early adopter and preparing the right set of forensic tools.
REFERENCES
Averill, B., Luiijf, E.A.M., 2010. Canvassing the cyber security landscape: why energy com-
panies need to pay attention. J. Energy Security, May.
Bohlen, J., Beal, G.M., 1957. The Diffusion Process. Agriculture Extension Service. Iowa
State College, Ames.
Bijlsma, T., de Kievit, S., van de Sluis, J., van Nunen, E., Passchier, I., Luiijf, E., 2013. Security
challenges for cooperative and interconnected mobility systems. In: Luiijf, E., Hartel, P.
(Eds.), Critical Information Infrastructures Security, 8th International Workshop, CRITIS
2013, Amsterdam, Lecture Notes in Computer Science, vol. 8328. Springer, Heidelberg,
pp. 1–15.
DHS, 2014. US Secret Service Written testimony of U.S. Secret Service for a Senate Banking,
Housing and Urban Affairs Subcommittee on National Security and International Trade and
Finance hearing titled “Safeguarding Consumers' Financial Data”. DHS, Washington, DC.
http://www.nationaljournal.com/library/110188
(accessed 15.02.14).
EC, 2007. Towards a general policy on the fight against cyber crime. COM(2007) 267 final,
Commission of the European Communities, Brussels, Belgium.
http://eur-lex.europa.eu/
LexUriServ/LexUriServ.do?uri=COM:2007:0267:FIN:EN:PDF
(accessed 15.02.14).
Do'stlaringiz bilan baham: |