Actor behaviour, notable incidents in critical infrastructures, and risks to the health sector

Author Identifier

Glenn Murray: https://orcid.org/0009-0005-6234-2510

Document Type

Book Chapter

Publication Title

Ransomware Evolution

First Page

33

Last Page

49

Publisher

Taylor & Francis

School

School of Science

RAS ID

76868

Comments

Johnstone, M. N., Crowley, M., & Murray, G. (2025). Actor behaviour, notable incidents in critical infrastructures, and risks to the health sector. In Ransomware evolution (pp. 33-49). CRC Press. https://doi.org/10.1201/9781003469506-5

Abstract

This chapter provides an analysis of actor behaviour, detailed profiles of various actors involved in significant incidents affecting critical infrastructure, and the consequent risks to the health sector in particular. It explores the distinct profiles of actors such as nation-state entities, independent cybercriminals, and insiders, focusing on their motives, strategies, and methodologies. A key part of this exploration includes understanding the psychological, socio-political, and economic motivations that drive these actors to target critical infrastructure. Furthermore, several cases are presented that highlight major incidents impacting critical infrastructure globally, emphasising their effects on the health sector. These incidents are scrutinised for exploited vulnerabilities and the ensuing impacts, particularly with respect to healthcare delivery, patient safety, and public trust in health systems. Finally, we discuss both legal and technical remedies to the challenges presented. Legal remedies involve recommendations for policy development, regulatory frameworks, and international cooperation to deter and punish malicious activities. Technical remedies focus on advanced cybersecurity measures, including innovative defensive technologies, continuous monitoring systems, and proactive incident response strategies. We suggest that the integration of actor behavioural analysis into these remedies enriches the approach to devising more effective protective measures. The chapter concludes with actionable recommendations for policymakers, cybersecurity experts, and healthcare administrators.

DOI

10.1201/9781003469506-5

Access Rights

subscription content

Share

 
COinS