Skip to content

Share

  • Add this article to your LinkedIn page
  • Add this article to your Twitter feed
  • Add this article to your Facebook page
  • Email this article
  • View or print a PDF of this page
  • Share further
  • Add this article to your Pinterest board
  • Add this article to your Google page
  • Share this article on Reddit
  • Share this article on StumbleUpon
  • Bookmark this page
PA IN THE MEDIA

Preventing an Olympic-sized disaster

"There would be a massive impact if there were a cyber attack that affected the Tube, bringing down the Oyster network for example."

  

pa's STEVE BAILEY, CYBER SECURITY CONSULTING

 

 

 

Stephen PritchardInfoSecurity Magazine24 April 2012

 

PA’s Steve Bailey, cyber security expert, is quoted in an article on the impact that the Olympic Games may have on London and the UK’s infrastructure. Steve talks about the key areas of concern in InfoSecurity Magazine.

Steve comments: “The authorities do seem to be doing a lot of preparation, but most of the information coming out appears to be focusing around keeping London running during the Games – around transportation for example …. They need to move away from that a little bit, towards things like the dangers of social engineering, for example.”

Steve goes on to comment on the impact of a cyber attack on London: “There would be a massive impact if there were a cyber attack that affected the Tube, bringing down the Oyster network for example, or affecting signalling. The effects would be disastrous, especially around transport hubs like mainline railway stations.”

Steve goes on: “The networks would also be a good place to attack; it would affect businesses but also people’s enjoyment of the Games. It is here that the interests and security concerns of the London 2012 organizers and businesses in the UK converge. The UK Cabinet Office has already warned businesses of possible disruption to internet connections as a result of Games-related congestion. This could be much, much worse if that infrastructure is also targeted by cyber-crime groups.”

You can read the article in full here.


By using this website, you accept the use of cookies. For more information on how to manage cookies, please read our privacy policy. 

×