Cyber Resilient Scotland 2025 to 2030: strategic framework

Refresh of the strategic framework for a Cyber Resilient Scotland 2021. In the face of an ever-changing cyber threat landscape, it will build on progress to date and address ongoing - and new - challenges.


Annex B

Emerging technologies and associated cyber security threats

Emerging technology Description Cyber security threats
Artificial Intelligence (AI) AI systems learn from data to make decisions or generate content
  • AI can launch faster, larger-scale automated attacks
  • Use of AI to create malware, generate phishing emails and deepfakes
  • Prompt injection attacks
  • Social engineering
Internet of Things (IoT) Network of connected physical devices, such as broadband routers, smart home hubs, remote patient monitoring
  • Insecure default settings and lack of patching
  • Malicious software (malware) can take over people’s internet connected devices and create networks of infected devices (botnets) which can be used to launch cyber attacks
  • Physical tampering
Quantum computing Computing using quantum bits (qubits)
  • Classical encryption tools may become obsolete and threaten data confidentiality and integrity
  • “Harvest-now, decrypt-later” attacks could allow criminals to steal and store encrypted files until more advanced quantum computers emerge
Blockchain Decentralised apps, smart contracts and digital assets
  • Smart contract bugs
  • Private key theft
  • Phishing and social engineering
  • Routing attacks
Augmented/Virtual Reality (AR/VR) Immersive digital environments for interaction
  • Identity spoofing
  • Sensor data leakage
  • Manipulation of virtual environments
Robotics and Autonomous Systems Robots, drones and self-driving cars
  • Ransomware and malware attacks
  • Remote hijacking
  • Espionage
  • Sensor interference
  • Data breaches
  • GPS spoofing
Biometric Authentication Use of biological traits for identity verification
  • Biometric data theft
  • Spoofing (e.g. fake fingerprints)
  • Deepfakes and AI-generated threats
Connected Places Urban areas using sensors and data for efficiency
  • Infrastructure sabotage
  • Privacy violations
  • Surveillance misuse
Space-based technologies Satellite internet, remote sensing and navigation
  • Signal jamming/spoofing
  • Satellite hacking
  • Ground station vulnerabilities
Genomics and Bioinformatics Use of computing in genetic research and healthcare
  • Genetic data breaches
  • Targeted bio-attacks
  • Data misuse in insurance/employment

Contact

Email: CyberResilience@gov.scot

Back to top