CHAPTER 4: BUSINESS, INFRASTRUCTURE AND ADVANCED TECHNOLOGIES

4.1 History

Attacks on computer facilities at institutes, businesses and key infrastructure points are hardly a new phenomenon. We’ll start by signalling something that we’ve so far missed in this book. Computer facilities and systems themselves are sometimes the central target of a perpetrator. This dynamic is likely to escalate as intelligence chatter suggests that a new wave of extremism and terrorism dubbed variously as ‘anti-technology’, ‘Luddite’ or ‘eco-fascist’ may be about to wash across our planet. In part, stimulated by growing concerns in some quarters at the role of AI-powered systems replacing workers (thus, fear of unemployment and poverty). Furthermore, disquiet spawning ...

Get Combatting Cyber Terrorism - A guide to understanding the cyber threat landscape and incident response planning now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.