More cyber attacks on critical infrastructure expected in 2018
Published On: January 9, 2018 |
A growing number of cyber attacks targeting critical infrastructure will be one of the major cyber security challenges for 2018, according to a new report.
Based on a survey of industry experts, the Kosciuszko Institute found while last year saw “an intense information war aimed at shaping the recipients’ viewpoint”, 2018 could become “a year of cyber attacks on critical infrastructure”.
Ambassador Marina Kaljurand, chair of the Global Commission on the Stability of Cyberspace and former Estonian foreign affairs minister, said that this trend will challenge the fundamental values that underpin the internet – namely, openness and freedom.
Paul Timmers, former director of the Sustainable & Secure Society Directorate within the EU’s DG CONNECT, added that as early as 2016, the world saw attacks on critical infrastructure systems, including logistics, health and energy.
The Kosciuszko Institute has now predicted that in 2018, these attacks could spread to other sectors, including water and transport. The company thinks that an important element of these potential incidents will be their predicted international and cross-sector nature, which then creates an urgent need for cooperation between international organisations, governments and companies.
This would result in economic challenges related to the global lack of qualified experts in cyber security. Mr Timmers added that digitisation blurring the border between sectors makes cooperation all the more important.
Meanwhile, Commander Wiesław Goździewicz, legal adviser to the NATO Joint Force Training Centre in Bydgoszcz, Poland, suggested that 2018 will see continued activity by cyber criminals.
He predicted that criminal groups will still be one step ahead of security specialists in 2018. Chief research officer at the cyber security branch of the Estonian Information System Authority Liisa Past emphasised the collaboration between cyber criminals and states, highlighting that proxies will continue to be employed in 2018 to achieve political goals.
Share This Post, Choose Your Platform!
With over 20 years in the business telecoms industry and an unrivalled reputation of delivering excellent, personal customer service, Arrow is one of very few companies in the UK able to provide a full telecoms, IT and energy consultancy and service proposition.
Savings through automation, scale, improved service. We’ve got that covered. But the true value comes with empathy, through empowerment, collaboration. It’s connecting people that drives us forward. It’s people that make tomorrow happen.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.