Cyber Readiness: Are We There Yet?

Cyber Readiness: Are We There Yet?

John S. Hurley, H. Mark McGibbon, Roxanne Everetts
Copyright: © 2014 |Volume: 4 |Issue: 3 |Pages: 16
ISSN: 1947-3435|EISSN: 1947-3443|EISBN13: 9781466653450|DOI: 10.4018/ijcwt.2014070102
Cite Article Cite Article

MLA

Hurley, John S., et al. "Cyber Readiness: Are We There Yet?." IJCWT vol.4, no.3 2014: pp.11-26. http://doi.org/10.4018/ijcwt.2014070102

APA

Hurley, J. S., McGibbon, H. M., & Everetts, R. (2014). Cyber Readiness: Are We There Yet?. International Journal of Cyber Warfare and Terrorism (IJCWT), 4(3), 11-26. http://doi.org/10.4018/ijcwt.2014070102

Chicago

Hurley, John S., H. Mark McGibbon, and Roxanne Everetts. "Cyber Readiness: Are We There Yet?," International Journal of Cyber Warfare and Terrorism (IJCWT) 4, no.3: 11-26. http://doi.org/10.4018/ijcwt.2014070102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Many of the systems that control the critical infrastructure were not originally designed with security in mind. This has left us vulnerable to unwanted attacks in many of the environments. It has become essential that the authors determine if their infrastructures are better prepared for existing and future threats. In this study, the authors will examine the impact of attacks, including terrorist attacks on critical infrastructures, in particular, the Energy sector. The results show that in spite of the warnings of the threats carried out in various sectors and organizations around the world, they have still remain extremely vulnerable because of a number of critical security issues that hamper their ability to better serve and protect our vital information assets. The authors examine some of the most prominent models being used today and how they may be modified to better serve the needs of their user communities and key stakeholders.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.