Cyber security is becoming the cornerstone of national security policies in many countries around the
world as it is an interest to many stakeholders, including utilities, regulators, energy markets, government
entities, and even those that wish to exploit the cyber infrastructure. Cyber warfare is quickly becoming
the method of warfare and the tool of military strategists. Additionally, it is has become a tool for
governments to aid or exploit for their own personal benefits. For cyber terrorists there has been an
overwhelmingly abundance of new tools and technologies available that have allowed criminal acts to
occur virtually anywhere in the world. This chapter discusses emerging laws, policies, processes, and
tools that are changing the landscape of cyber security. This chapter provides an overview of the research
to follow which will provide an in depth review of mobile security, mobile networks, insider threats, and
various special topics in cyber security.