Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Security Architecture

Cyber-attack Could Knock out British Military: Lawmakers

LONDON – The British military’s dependence on information technology means it could be “fatally compromised” by a cyber-attack but the government seems unprepared for such an event, lawmakers warned Wednesday.

LONDON – The British military’s dependence on information technology means it could be “fatally compromised” by a cyber-attack but the government seems unprepared for such an event, lawmakers warned Wednesday.

Parliament’s defence committee heard evidence that cyber-attacks could disrupt military communication and information systems, radars and satellites, and leave combat units such as airplanes or ships dysfunctional.

But in a new report, the MPs expressed concern that the government did not have a back-up plan in the case of a failure of technology, instead focusing on averting such attacks in the first place.

UK Cyberwar“The evidence we received leaves us concerned that with the armed forces now so dependent on information and communications technology, should such systems suffer a sustained cyber-attack, their ability to operate could be fatally compromised,” the report said.

“Given the inevitable inadequacy of the measures available to protect against a constantly changing and evolving threat… it is not enough for the armed forces to do their best to prevent an effective attack.

“In its response to this report the government should set out details of the contingency plans it has in place should such an attack occur. If it has none, it should say so — and urgently create some.”

Junior defence minister Andrew Murrison denied the government was complacent, saying it was investing £650 million ($1 billion, 800 million euros) over four years in the national cyber security strategy program.

“The UK armed forces and the equipment and assets they use are amongst the world’s most modern and advanced, so of course information technology plays a vital role in their operation,” he said.

“Far from being complacent, the Ministry of Defence takes the protection of our systems extremely seriously and has a range of contingency plans in place to defend against increasingly sophisticated attacks although, for reasons of national security, we would not discuss these in detail.”

Advertisement. Scroll to continue reading.

Related: Sophisticated DDoS Toolkit Used in Recent Bank Cyber Attacks

Related: Cyberattack Capable of Downing Entire Internet Is Unlikely, Experts Say

Related: Why All Cyber Attacks Originate in China

Related: DDoS Toolkit Being Used in Synchronized Attacks Against Banking, Hosting and Energy Firms

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Artificial Intelligence

ChatGPT is increasingly integrated into cybersecurity products and services as the industry is testing its capabilities and limitations.

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Artificial Intelligence

Microsoft and Mitre release Arsenal plugin to help cybersecurity professionals emulate attacks on machine learning (ML) systems.

Endpoint Security

Apple has launched a new security research blog and website, which will also be the new home of the company’s bug bounty program.