Cybersecurity: Threats, Challenges, Opportunities
November 2016
Cybersecurity
Threats
Challenges
Opportunities
¡°It is only when
they go wrong
that machines
remind you
how powerful
they are.¡±
Clive James
Cybersecurity ¨C Threats Challenges Opportunities
3
Contents
01
03
02
Foreward
1
Executive summary
4
Threats in the
information age
The nature of threats
13
14
The Internet of Things (IoT)
16
Botnet armies
17
When security is an afterthought 18
A brave new world
Cyber speak!
5
6
What is cybersecurity?
And the weakest link is¡
7
9
A world without cybersecurity
11
Autonomous systems
Driverless cars and transport
ATMs and Point of Sale
What about wearables?
19
19
21
22
Cyberwarfare
Automated attacks
Energetic Bear
Cyberattacks on infrastructure
When software kills
24
24
24
26
28
Data manipulation
Backdoors and espionage
Cloud concerns
Blast from the past
Virtualised threats
29
29
29
30
32
Industry and the individual
Ransomware and Cryptoware
Multi-vector attacks
Identity theft
The world we live in
33
33
33
34
34
04
The future in our hands
The 100% secure computer
35
37
Opportunities
The data-driven economy
Technology as wealth creation
Cybersecurity as job growth
Leveraging technology talent
38
38
39
39
39
Challenges
Leadership
Learning from history
Collaboration
Education and awareness
You are what you do
Legal and regulatory
Services and privacy
Perception and practicality
40
40
40
41
41
43
43
43
44
05
State of the nation
What role can you play?
Government
Education and research
Business and industry
You, the individual
Looking to the road ahead
45
46
47
47
50
50
50
The five pillars of cybersecurity readiness
Online resources
51
52
Through the looking glass
Fast facts
Glossary
References
53
55
57
59
Cybersecurity ¨C Threats Challenges Opportunities
5
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related searches
- threats to biodiversity ppt
- nist cybersecurity risk assessment template
- swot analysis threats examples
- threats to internal validity research
- cybersecurity resources for small businesses
- best cybersecurity stocks to buy
- cybersecurity policy for small business
- cybersecurity risk assessment template
- opportunities and challenges of globalization
- cybersecurity for businesses
- cybersecurity policy and procedures
- cybersecurity protection small business