List of Figures and Tables
Figures
Figure 1.1: Simplified overview of the banking Trojan cybercrime value change
Figure 1.2: BigDog, Boston Dynamics, 2018
Figure 1.4: Total cost of Cyber Crime in seven countries
Figure 2.1: Communications access to control systems
Figure 2.2: Typical two-firewall network architecture
Figure 2.3: Incidents of near nuclear use
Figure 2.4: Software in weapon systems
Figure 2.5: Weapons interfaces that can be used as pathways to access the system
Figure 2.6: Predicted Artificial Intelligence Development
Figure 2.7: Artificial Intelligence and four layers of defence