Summary of Cyber Attacks

Looking for the article?
We have the summary! Get the key insights in just 5 minutes.

Cyber Attacks summary
Start getting smarter:
or see our plans

Rating

8 Overall

9 Importance

8 Innovation

7 Style


Recommendation

On December 23, 2015, some 200,000 people in the Ukraine experienced a power outage which lasted several hours. No storm or faulty equipment caused this electricity cut; it was, in fact, the result of a cyberattack. Gabrielle Desarnaud of the French Institute of International Relations explains the energy sector’s increasing vulnerability to cyberattacks, examines how cyberattacks on energy infrastructure could negatively impact the economy and looks at how Europe is working to overcome obstacles to the creation of “common cybersecurity culture.” getAbstract recommends this report to European Union policy makers and leaders within the European energy sector.

In this summary, you will learn

  • Why the energy sector is vulnerable to cyberattacks,
  • How cyberattacks on energy infrastructure can affect the economy and
  • How Europe is working to create a “common cybersecurity culture.”
 

About the Author

Gabrielle Desarnaud is a researcher at the French Institute of International Relations’ Center of Energy.

 

Summary

If nothing else, the December 2015 cyberattack on Ukraine’s electrical grid served as a wake-up call. It laid bare the ways hackers can take control of energy infrastructure. Granted, to execute such an attack successfully takes immense financial resources and insider knowledge. Still, the fact...

More on this topic

Customers who read this summary also read

How to Withstand a Cyberattack
How to Withstand a Cyberattack
8
Dark Territory
Dark Territory
8
The Hacked World Order
The Hacked World Order
9
Where Is Cybercrime Really Coming From?
Where Is Cybercrime Really Coming From?
8
The Global Risks Report 2018
The Global Risks Report 2018
9
The Malicious Use of Artificial Intelligence
The Malicious Use of Artificial Intelligence
8

Related Channels

Comment on this summary