Backup software are secure tools to backup different types of data that are on a computer or server. The backing up process creates and stores copies of the original files so that they can be recovered in case of file deletion or corruption.
Budget Economic Survey 2023 Updates: Finance Minister Nirmala Sitharaman represents the country’s annual pre-budget economic survey at Parliament. According to the Economic Survey 2022-23, the following fiscal year will see real GDP growth of 6.5 percent.
Get here Economic Survey 2023 summary presented by FM Nirmala Sitharaman
Budget Economic Survey 2023: Finance Minister Nirmala Sitharaman represents the country’s annual pre-budget economic survey at Parliament on January 31, 2023. According to the Economic Survey 2022-23, the following fiscal year will see real GDP growth of 6.5 percent.
The Indian Economy would also increase by 7% for 2023-24. This growth also depicts that India has become the world's fifth-largest economy.
The documents of Economic Survey 2023 are presented by CEA V Anantha Nageswaran, they can be downloaded from the government’s official website https://www.indiabudget.gov.in/.
Click on the below available links to obtain the pdf of Economic Survey 2023.
Economic Survey 2022-23 Official Documents | Download PDF |
Preface | Click Here |
State of the Economy 2022-23: Recovery Complete | Click Here |
India’s Medium-term Growth Outlook: With Optimism and Hope | Click Here |
Fiscal Developments: Revenue Relish | Click Here |
Monetary Management and Financial Intermediation: A Good Year | Click Here |
Prices and Inflation: Successful Tight-Rope Walking | Click Here |
Social Infrastructure and Employment: Big Tent | Click Here |
Climate Change and Environment: Preparing to Face the Future | Click Here |
Agriculture & Food Management: From Food Security to Nutritional Security | Click Here |
Industry: Steady Recovery | Click Here |
Services: Source of Strength | Click Here |
External Sector: Watchful and Hopeful | Click Here |
Physical and Digital Infrastructure: Lifting Potential Growth | Click Here |
President Draupadi Murmu addressed the Budget session and highlighted some of the points, such as:
The economic survey is an annual report of the Ministry of Finance, Government of India. Every year the Department of Economic Affairs, Ministry of Finance introduces the survey in the parliament prior to the Union Budget.
The Budget is prepared under the guidance of the Chief Economic Adviser of India. The economic survey is presented to both the Parliament House during the Budget session.
The economic survey contains the Ministry’s view on the economical state of the country. It represents the development in the Indian economy over the past financial years and exhibits the country’s performance on essential development programs, highlighting the policy initiatives of the government and the economic prospects in the short to medium term.
The Economic Survey represents the country’s economic trends and ensures a better appreciation of the resource mobilization and their allocation in the Union Budget. It analyzes the agricultural, industrial, employment, import, and export trends in the country.
The survey also directs the Gross Domestic Product for the coming financial year and comprises insights into India’s economic growth.
The survey is prepared by the Economics Division of the Department of Economic Affairs under the guidance of the Chief Economic Advisor (CEA). The current CEA of India is Dr. V Anantha Nageswaran.
The first Economic Survey of India was prepared by the Finance Ministry in 1950-51. At that time, the survey was represented along with the Union Budget. However, later it was de-linked from the budget in 1964 and unveiled priorly to provide a context of the latter.
Every year the theme of the Economic Survey is different. The theme for the Economic Survey 2023 is likely to take note of inflation levels, likely pressure on the Indian Rupee due to RBI’s tightening of monetary policy, employment conditions, pick-up in private investment, infrastructure spending, and improvement in the financial growth of the Indian banking sector.
The economic survey is an annual report of the Ministry of Finance, Government of India. It represents the country’s economic trends and ensures a better appreciation of the resource mobilization and their allocation in the Union Budget.
The Economic Survey 2023 PDF of India will be available for reading on the official website https://www.indiabudget.gov.in/.
Union Budget 2023 Highlights: Finance Minister Nirmala Sitharaman presented the Union Budget 2023-24 in Parliament on February 1, 2023. Here are the key highlights from Sitharaman’s Budget speech, summary, explanations, and complete analysis.
Budget 2023 Highlights: Finance Minister Nirmala Sitharaman presented the Union Budget 2023, the fifth budget on February 01 (Wednesday). The Finance Minister said that the Union Budget 2023-24 aimed at the overall development of the Indian Economy with respect to the global perspective. She also said that the Budget proposals for the 2023-24 financial year rest on envisioning a prosperous and inclusive India, in which the fruits of development reach all regions and citizens, especially our youth, women, farmers, OBCs, Scheduled Castes and Scheduled Tribes.
Finance Minister Nirmala Sitharaman said “This Budget hopes to build on the foundation laid in the previous Budget, and the blueprint drawn for India@100. We envision a prosperous and inclusive India, in which the fruits of development reach all regions and citizens, especially our youth, women, farmers, OBCs, Scheduled Castes, and Scheduled Tribes.”
While presenting the Budget 2023-24, the Finance Minister also said “ In these nine years, the Indian economy has increased in size from being 10th to 5th largest in the world. We have significantly improved our position as a well-governed and innovative country with a conducive environment for business as reflected in several global indices. We have made significant progress in many Sustainable Development Goals.”
The economic agenda for achieving this vision focuses on three things: first, facilitating ample opportunities for citizens, especially the youth, to fulfill their aspirations; second, providing a strong impetus to growth and job creation; and third, strengthening macroeconomic stability.
The Budget 2023-24 adopts the following seven priorities. They complement each other and act as the ‘Saptarishi’ guiding us through the Amrit Kaal.
In the Union Budget 2023-24 there were remarkable changes to the new personal income tax structure in a year. Currently, those with income up to Rs. 5 lakhs do not pay any income tax in both old and new tax regimes. The rebate limit has been increased to Rs. 7 lakhs in the new tax regime. Thus, persons in the new tax regime, with income up to 7 lakhs will not have to pay any tax.
The second proposal relates to middle-class individuals and was introduced, in the year 2020. According to the new personal income tax regime with six income slabs starting from Rs.2.5 lakhs. The change in the tax structure in this regime by reducing the number of slabs to five and increasing the tax exemption limit to Rs. 3 lakhs. The new tax rates are.
Annual Income |
New Tax Slab |
0-3 lakh |
Nil |
3-6 lakh |
5 percent |
6-9 lakh |
10 percent |
9-12 lakh |
15 percent |
12-15 lakh |
20 percent |
Above 15 lakh |
30 percent |
Let’s take a look at the Union Budget 2023-24 highlights and how it affects various sectors. Here are the key changes announced by FM Sitharaman and obtain Budget 2023 highlights PDF here.
Budget 2023-24 |
PDF Download |
Budget 2023 at a Glance (Full) |
|
Budget 2023 at a Glance |
|
Budget 2023 Deficit Statistics |
|
Transfer of Resources to States and Union Territories with Legislature |
|
Budget 2023 Profile |
|
Budget 2023 Receipts |
|
Budget 2023 Expenditure |
|
Budget 2023 Major Schemes |
Also Read -
The highlights of the Budget for the last five years has been provided below. You can obtain the Budget copies from the provided link for your future reference.
Also Read - Budget Meaning in Hindi
Road Transport Budget:
MSME Budget:
Skill Development Budget:
Health Budget:
Banking Budget:
Urban Planning Budget:
Fiscal Management Budget:
The key highlights of the Budget 2023-24 Direct Taxes (Part B) are as follows:
The key highlights of the Budget 2023-24 Indirect Taxes are as follows:
Also Read:-
Agriculture Budget 2023 Highlights: PDF obtain with Key Summary & Takeaways
Railways Budget 2023 Highlights: PDF obtain with Key Summary & Takeaways
To transfer files back and forth to CS unix servers from a unix system, use either the scp(non-interactive) or sftp(interactive) commands. Both of these commands will do file transfers between unix/linux 'ssh' hosts, with each one working differently.
Click HERE for instructions on how to open up a terminal session to a CS unix system via ssh.
SCP1. SCP : This utility provides non-interactive file transfers between ssh-enabled unix/linux systems. After contacting the ssh server/host, the scp program will prompt you for your password. If that password is correct, the file transfer will take place, with a status message indicating file transfer times and other items.
To copy a file TO a CS server from another UNIX server :
scp localfilename cs_user_name@cs.uml.edu:~/destination_file_name
To transfer entire directory structures, use the '-r' option to scp:
scp -r localdirectory cs_user_name@cs.uml.edu:~/destination_directory_name
To transfer files/directories FROM the CS server while logged into a remote unix/linux server, reverse the syntax:
scp [-r] cs_user_name@cs.uml.edu:~/destination_file_name localfilename
If the username you are using on the local unix/linux system matches the remote unix/linux system username, you do not need to use the username prefix before the name of the ssh server you are transferring files to/from:
scp [-r] localfilename cs.uml.edu:~/destination_file_name
scp [-r] cs.uml.edu:~/destination_file_name localfilename
SFTP2. SFTP : This utility provides a interactive file transfer session between ssh-enabled unix/linux systems. After contacting the ssh server/host, the scp program will prompt you for your password. If that password is correct, you will be entered into an interactive command line session, analogous to the standard 'FTP' program.
To start the sftp program, type :
sftp server_name
This will connect to the sftp server and will prompt you for your password. As with scp and ssh, it will use the same username as the user that executed the sftp program. If you wish to 'sftp' to another server with a different username, use the following syntax:
sftp username@server_name
Once you successfully log into the 'sftp' session, your prompt will be "sftp>". From this prompt you can use the get command to receive files from the server you have connected to and the put command to send files to the server you have connected to.
To learn more about using sftp, type man sftp at your unix prompt.
FOX News Go uses about 2GB per hour of SD viewing and 4GB per hour of HD viewing. This can vary depending on your device and internet connection. If you are concerned about your data usage we recommend not streaming over a cellular network and contacting your Internet or Cellular Service Provider.
FOX News will stream at the highest quality possible based on your device and internet connection quality. For the best quality we recommend streaming via Wi-Fi or 4G.
You can watch FOX News Channel on FOX News Go and FOX Business Network on FOX Business Go.
Thank you for joining!
July 2022
These days upgrading to advanced network infrastructure involves firms being able to deliver mission-critical services through cloud providers and through their own cloud resources. Increased network infrastructure capacity need has seen deployment of optical networking and advanced network solutions such as software-defined wide area network (SDWAN).
The National Testing Agency (NTA) will release the admit card for the Joint Entrance Examination (Main) 2023 January Session test anytime soon. The session 1 hall ticket for JEE Main 2023 will be available to obtain on the official website jeemain.nta.nic.in. Once released, candidates can obtain the admit card using their application ID, date of birth, and security pin.
The National Testing Agency (NTA) will release the admit card in an online format. NTA has not disclosed the exact date and time for releasing JEE Admit Card and Examination City Slip 2023. JEE Main 2023 entrance test for the January session will be held on 24, 25, 27, 28, 29, 30 and 31 January, 2023. Engineering aspirants wondering how to obtain JEE Main Admit Card 2023 online from the official website can check the steps below.
JEE Main 2023 Admit Card Details
As per reports, the JEE Main 2023 session 1 will be held from 24th - 31st January 2023. The Admit Cards can be downloaded from the official website probably in the third week of January 2023.
Events
Date of Release
JEE Main session 1 admit card release date
Third week of January 2023
JEE Main session 2 admit card release date
Last week of March 2023
Steps to obtain JEE Main 2023 Admit Card?
Students who have to appear for JEE Main 2023 Exams this year can visit the official website to obtain the detailed time table. In case you have any doubts or confusion on how to obtain the JEE Main 2023 Admit Card, then please go through the steps below.
Visit the official website: jeemain.nta.nic.in
Click on the link that reads, ‘JEE Main 2023 Admit Card’ on the home page
Enter the required credentials i.e (application number and date of birth)
JEE Main Admit Card will be displayed on the screen
Download the admit card PDF for JEE Main 2023 January Session and take a printout
Details Mentioned in JEE Main Admit Card 2023
After JEE Main 2023 admit card PF download, it is necessary for students to check if all the details given on the admit card are mentioned correctly. The details mentioned on the Admit Card include:
Candidate’s Name
Application Number
Roll Number
Course Name
Father’s Name
Gender
Date of Birth
Photograph
Category
Test City
Centre Code
Exam Shift
Exam Date
Timings
Exam Centre
Reporting Time
Things to Remember for JEE Main 2023 Admit Card
It should be noted that JEE Main admit card for 2023 will be released separately for each session
No hard copy or duplicate JEE Main admit card 2023 will be issued or sent by post to the applicants
Candidates who had mistakes or incorrect information in the application form will not be issued the admit card
Always carry the hall ticket/admit card to the Exam Center as the entry will not be permitted without the admit card.
Exam Pattern of JEE Main 2023
According to the JEE Main 2023 test pattern, the test will be conducted in online mode (Computer-Based-Test (CBT).
JEE Main test Pattern
Exam Papers
Paper 1- B.E/B.Tech
Paper 2- B.Arch
Paper 3- B.Plan
Exam Duration- 3 Hours
Types of Question- Objective (MCQs) and Numerical Value Type
Marks for Correct Answer: (+4 Marks)
Marks for Negative Answer: (-1 Marks)
Marks for Unattempted Questions- 0
What are the Documents Required in the Examination Centre?
Along with the printed copy of JEE Main Admit Card 2023, the candidates are advised to carry various other documents to the examination center. The other documents that the applicants are required to carry to the Examination Centre are:
A passport-size photograph for pasting on the attendance sheet during the examination is required
A valid identity proof, such as the Driving License/PAN Card/Voter ID/Aadhaar Card/Passport/Aadhaar Enrolment No for identification
If the Candidate is claiming for PwD Reservation, then PwD Certificate is mandatory
JEE Main Self Declaration Form
(If you have a story in and around Mumbai, you have our ears, be a citizen journalist and send us your story here. )
(To receive our E-paper on WhatsApp daily, please click here. To receive it on Telegram, please click here. We permit sharing of the paper's PDF on WhatsApp and other social media platforms.)
The best backup software makes it simple and easy to reliably backup your saved files and folders, as well as provide advanced options to better manage your saved data.
It doesn't matter whether you're a business or personal user, it's essential to have some form of backup software in place for all your documents and data, else risk losing everything to a hard drive crash.
To keep risk to an absolute minimum, this means have a 3-2-1 backup (opens in new tab) strategy: there needs to be three copies of the data, the original, plus two copies of it; the data needs to be stored on at least two different types of media; and at least one of these copies should not be stored in the same location as the other two, and should be offsite.
In other words, not only save your data to your computer, but also use an external hard drive to have a second local copy, plus use a cloud backup solution to ensure you have a third offsite copy.
However, trying to coordinate everything together can be a pain, as you don't want to have to manually copy all of your files and folders to another backup just because a few have changed. This is especially as you won't want it to complicate your document management, especially when using file management to share files securely.
Luckily, there are a number of backup software solutions that aim to do exactly this, by allowing you to easily and automatically set up different backups as and when you need to. In some instances it's simply a case of new files being copied across as soon as they are saved, and for others it's a case of having regular backups carried out at specific times.
While there are also free backup solutions available, here we'll focus on the paid-for software, though a number have free tiers or free trials available.
We've compared these software across various aspects, like their interface, backup features, security, and OS support. We evaluated whether the software support cloud backups, how much data they can backup, and the flexibility of their pricing plans, among other things.
We've also covered the best ways to share big files.
Why you can trust TechRadar Our expert reviewers spend hours testing and comparing products and services so you can choose the best for you. Find out more about how we test.
Acronis Cyber Protect Home Office, formerly known as Acronis True Image, is a full featured backup solution that promises to “never lose another file.”
This backup software simultaneously sends data to both a local drive, and a cloud solution. It can also do cloning and mirror imaging duties for your rig’s system drive, in just two easy clicks.
Acronis Cyber Protect Home Office has an anti-ransomware feature that detects, and can even reverse the unauthorized encryption of a hard drive to keep data safe from this increasingly prevalent type of attack. It also offers support for mobile device backup. The downside is that all this backing up does use some system resources, and can even lengthen boot times.
A one-year subscription offers ransomware protection built in. For cloud-backups, you'll need to upgrade to the Advanced plan. A Premium plan offers 5TB of storage and electronic signatures.
Read our full Acronis Cyber Protect review.
EaseUS ToDo Backup is a solution that has been around for over a decade, with packages for businesses, home users and even service providers. It offers software for both Windows (XP and higher) and Mac platforms.
In the Home and Home Office tier, it can handle an incremental or full backup for up to 16TB of data, including coping with multiple partitions, hardware RAID, and it also supports cloud backups.
While there is a free tier, the single paid Home tier offers more features for those really concerned with managing their backups on a regular basis. The Home edition is available for a one-time fee, or alternatively you can subscribe on a yearly basis, or a charge every two years.
The Business options for a single Workstation has additional options for servers and technicians which offer an even more rich range of features.
For more information, read our full EaseUS Todo Backup review.
Paragon Backup & Recovery offers a flexible solution to simplify complex backup solutions. With the Create Backup Job wizard, guidance is provided to what will be backed up, and where the data will be stored.
This software covers all the usual backup processes, and can easily create complex routines, including automated backup. A standout feature is the WinPE recovery media, which in the worst case scenario comes to the rescue for when your PC refuses to even boot. Via a bootable USB stick, users can rescue files, fix boot problems, and even perform a restoration to get up and running again in a jiffy.
A home plan is charged for a single home user license. For business users you will need to contact Paragon for a quote.
To find out more, read our full Paragon Backup & Recovery review.
NovaBackup is a solid backup solution available as a subscription, and ideal for the essential backup task of making a copy of your computer’s hard drive on local media. For modest users this will suffice, but it falls short when it comes to the interface, support for platforms other than Windows and Linux, and more advanced tasks.
However, it does at least include any upgrades to the program, and also supports backup to cloud providers (including OneDrive and Dropbox).
The standout feature of NovaBackup PC is the security offered, as the software runs locally to send the data to a local media drive, and does not connect to the internet. Also, the backup can be performed with AES 256-bit encryption for extra security.
Home users are charged for an annual subscription for a single PC, which offers protection against data loss, ransomware, and hardware failure. There's also a server edition available which offers optional support for virtual machines, SQL, and Microsoft Exchange, as well as being HIPAA compliant.
Genie Backup Manager promises “effortless protection for all your files,” and can be configured in three steps. There is a trial available for Windows XP and higher, although not for other platforms.
This software is focused on traditional drive backup to a media drive, and the developer offers separate solutions for other situations including Android backup and cloud backup needs, keeping Genie Backup Manager from being a more comprehensive application.
The app sits in the Windows system tray as an icon, quietly going about its business. Notable features include the option to have the backup run at full speed via Turbo Mode, or to run in Smart Mode which intelligently adjusts itself based on the available system resources.
For those who hate interruptions, this software has a Game/Movie mode which automatically stifles any annoying pop-ups, to make sure that your gaming or viewing experience isn’t compromised. There’s a mobile app for iOS, but not for the more popular Android platform.
Read our full Genie Backup Manager review.
There are a few other options worth considering, not least free backup software which is still useful but will tend to have fewer options and configurations you can customize for what you need, plus of course there's always the option to use cloud backup software. Here we'll look more closely at some of those options:
Google One (opens in new tab) is the new name for Google Drive, which allows home uses up to 15GB of free storage. Simply obtain the Google Backup and Sync app to your computer, install and run, and this will create a folder in your Windows file explorer from to which you can save your most important documents. While there are paid options to upgrade, this can prove expensive over the long-term if you want to backup and sync a sizable hard drive.
Microsoft OneDrive (opens in new tab) is the backup and sync storage option bundled with Microsoft Office 365. There is a free version that allows up to 10GB of storage, but that it means it suffers from the same limitations as above, not least that you'd be better off using cloning or image software to back up your full hard drive. Even still, it's a useful keep to keep the most essential files safe.
Dropbox (opens in new tab) is another cloud server that allows you to save important documents online, again being free to use with the same limitations as above. But as before, the ability to save a smaller number of essential files, such as for work, study, creative projects, and similar, can be invaluable.
Cobian Drive (opens in new tab) is something you install and setup on your PC for local use, which means that your saved files and folders are saved elsewhere on your machine, such as a second hard drive specifically for backups, or an external hard drive for the same purpose. The software is a little old but it's still useful and worth considering for a free and quick fix.
Backup4all (opens in new tab) is the paid version of the free Backup solution, this time adding more advanced features and a wizard for easily setting up your back up options. The software is relatively inexpensive, and there's a 30-day free trial to allow you to test it out. As well as support for local and external hard drives, it can also save to a USB stick or to a designated cloud service.
We've also reviewed the best Windows Hosting services and the best business Macs.
Backup software are secure tools to backup different types of data that are on a computer or server. The backing up process creates and stores copies of the original files so that they can be recovered in case of file deletion or corruption.
When deciding which backup software to obtain and use, first try to determine how difficult the data might be to recover. For example, not all will backup multiple partitions at the same time.
You'll want to check what kind of security features the software offers, and if you deal with sensitive data, options with higher grades of encryption are ideal. Make sure to check whether the backup software supports the type of operating system you use.
Additionally, free or budget software options may have built-in limitations on how much data or how many files you can actually backup.
To test for the best backup software we first set up an account with the relevant software platform, whether as a obtain or as an online service. We then tested the service to see how the software could be used for backing up data from both a normal hardware as a well as an external hard drive. The aim was to push each software platform to see how useful its basic tools were and also how easy it was to get to grips with any more advanced tools.
This timeline records significant cyber incidents since 2006. We focus on cyber attacks on government agencies, defense and high tech companies, or economic crimes with losses of more than a million dollars.
January 2023. Latvian officials claimed that Russia-linked hackers launched a cyber espionage phishing campaign against its Ministry of Defense. The Latvian Ministry of Defense stated this operation was unsuccessful.
January 2023. CISA, the NSA, and the Multi-State Information Sharing and Analysis Center released a joint advisory warning of an increase in hacks on the federal civilian executive branch utilizing remote access software. This follows an October 2022 report on a financially motivated phishing campaign against multiple U.S. federal civilian executive branch agencies.
January 2023. Hackers targeted the Serbian government in an attempt to disable its Ministry of Internal Affairs network infrastructure. Serbian officials worked with industry professionals to block the attacks.
January 2023. Russia-linked hackers deployed a ransomware attack against the UK postal service, the Royal Mail. The attack disrupted the systems used to track international mail. It took 20 days for the Royal Mail to fully restore international mail services.
January 2023. Hackers disrupted access to over 1500 Nepalese government websites by flooding its main government server with traffic.
January 2023. Iran-linked hackers executed ransomware attacks and exfiltrated data from U.S. public infrastructure and private Australian organizations. Australian authorities claim that the data exfiltrated was for use in extortion campaigns.
January 2023. The FBI named North Korea-linked hackers responsible for the June 2022 $100 million heist from American crypto firm, Harmony’s Horizon Bridge. In January 2023, the hackers used a system called Railgun to launder over $60 million worth of cryptocurrency stolen in the June attack. Railgun is a privacy system built on the Ethereum blockchain to ensure the identity of the user is kept secret.
January 2023. Hackers used ransomware to encrypt 12 servers at Costa Rica’s Ministry of Public Works, knocking all its servers offline.
January 2023. Albanian officials reported that its government servers were still near-daily targets of cyber-attacks following a major attack by Iran-linked hackers in 2022.
January 2023. Hackers launched a series of cyber-attacks against Malaysian national defense networks. Malaysian officials stated that the hacking activities were detected early enough to prevent any network compromise.
January 2023. Hackers targeted government, military, and civilian networks across the Asia Pacific leveraging malware to obtain confidential information. The malware targeted both the data on victim machines as well as audio captured by infected machines’ microphones.
January 2023. Hackers sent over a thousand emails containing malicious links to Moldovan government accounts.
December 2022. A U.S. lawmaker predicted spyware hacks of U.S. government employees could be in the hundreds, including diplomats in multiple countries. This follows a probe into how many devices spyware are affected in the U.S. government.
November 2022. The UAE hired three former U.S. intelligence and military officials to help the government break into computers in the United States and other countries.
November 2022. Microsoft attributed cyberattacks aimed at transportation and related logistics industries in Ukraine and Poland to a Russian GRU hacking group. The campaign began in late September 2022.
November 2022. Hackers targeted Bahraini government websites with DDoS attacks prior the country’s parliamentary and local elections.
November 2022. Iranian government-sponsored hackers compromised the U.S. Merit Systems Protection Board, exploiting the log4shell vulnerability as early as February 2022. After breaching the network, hackers installed cryptocurrency-mining software and deployed malware to obtain sensitive data.
November 2022. Hackers damaged Danish State Railways’ network after targeting an IT subcontractor's software testing environment. The attack shut down train operations for several hours.
November 2022. An Indian-based hacking group targeted Pakistani politicians, generals and diplomats, deploying malware that enables the attacker access to computer cameras and microphones.
November 2022. State-sponsored hackers with possible ties to the Chinese government targeted multiple Asian countries in an espionage operation since March 2022, compromising a digital certificate authority in one country.
November 2022. Hackers disabled digital services of the Vanuatu government in a cyberattack. The attack affected all government services, disabling emails, websites, and government systems, with only partial access restored a month later. Australian sources stated the hack was a ransomware attack.
November 2022. Hackers targeted the Guadeloupe government, forcing the shutdown of all government computers to “protect data” during incident response and detect the scope of the attack.
November 2022. Indian hackers targeted Pakistani government entities, including the military, and companies since April 2020. The attacks enabled hackers to infiltrate systems and access computer controls.
November 2022. Suspected Chinese-linked hackers carried out an espionage campaign on public and private organizations in the Philippines, Europe, and the United States since 2021. The attacks used infected USB drives to deliver malware to the organizations.
November 2022. Chinese state-affiliated actors increased attacks on smaller nations in Southeast Asia for cyberespionage purposes.
October 2022. Hackers targeted a communications platform in Australia, which handles Department of Defence data, in a ransomware attack. The government believes hackers breached sensitive government data in this attack.
October 2022. Russian official, Vladimir Shin, accused the U.S. government and its allies of a coordinated campaign of cyberattacks against Russia. Shin cited comments from General Paul Nakasone confirming the U.S. "conducted a series of operations" in response to Russia's invasion of Ukraine.
October 2022. A Ukrainian newspaper published hacked data claiming to be sensitive information from Russian defense contractors. The hackers responsible are part of an anti-Putin group in Russia.
October 2022. Hackers targeted Bulgarian websites belonging to the presidential administration, the Defense Ministry, the Interior Ministry, the Justice Ministry, and the Constitutional Court in a DDoS attack. A pro-Russian hacking group claimed responsibility for the attack, stating it was punishment “for betrayal to Russia and the supply of weapons to Ukraine.”
October 2022. Hackers targeted several major U.S. airports with a DDoS attack, impacting their websites. A pro-Russian hacking group promoted the attack prior to its execution.
October 2022. Pro-Russian hackers claimed responsibility for an attack that knocked U.S. state government websites offline, including Colorado’s, Kentucky’s and Mississippi’s.
October 2022. CISA, the FBI, and NSA announced state-sponsored hacking groups had long-term access to a defense company since January 2021 and compromised sensitive company data.
September 2022. Iranian hackers targeted Albanian computer systems, forcing Albanian officials to temporarily shut down the Total Information Management System, a service used to track individuals entering and exiting Albania. This attack closely followed Albania’s decision to sever diplomatic ties with Iran as well as the American sanctions and NATO’s condemnation of an Iranian cyberattack against Albania in July. In the July attack, Iranian actors deployed ransomware on Albanian Government networks that destroyed data and disrupted government services.
September 2022. A newly discovered hacking group targeted telecommunications, internet service providers, and universities in the Middle East and Africa. The group deploys malware platforms directly into systems’ memory, bypassing native security solutions.
September 2022. Hackers targeted Montenegro’s government networks, rendering Montenegro’s main state websites and government information platforms inaccessible. Montenegrin officials blamed Russia for the attack.
September 2022. Hackers targeted the state-level parliamentary website of Bosnia and Herzegovina, rendering the sites and servers inaccessible for multiple weeks.
September 2022. China accused the U.S. National Security Agency (NSA) of numerous cyberattacks against China’s Northwestern Polytechnical University. Authorities claim the NSA stole user data and infiltrated digital communications networks.
September 2022. The group Anonymous took responsibility for a series of cyberattacks against the Iranian government that took down two main Iranian government websites and the websites of several state media organizations.
September 2022. Hackers targeted the Mexican Defense Ministry and accessed six terabytes of data, including internal communications, criminal data, and data that revealed Mexico’s monitoring of Ken Salazar, the U.S. Ambassador to Mexico. Mexican President Andres Manuel Lopez Obrador confirmed the authenticity of the data, including personal health data released to the public.
September 2022. A Russian-based hacking group targeted the website of the United Kingdom’s intelligence agency MI5 with a DDoS attack that temporarily took the site offline.
August 2022. Hackers breached Italy’s energy agency, Gestore dei Servizi Energetici (GSE), compromising servers, blocking access to systems, and suspending access to the GSE website for a week.
August 2022. Hackers used a DDoS attack to temporarily take down the website of Taiwan’s presidential office. The Taiwanese government attributed the attack to foreign hackers and stated normal operations of the website resumed after 20 minutes. Taiwan’s Foreign Ministry also noted hackers targeted their website and the main portal website for Taiwan’s government.
August 2022. Hackers targeted the Finnish Parliament with a DDoS attack that rendered the Parliamentary website inaccessible. A Russian group claimed responsibility for the attack on Telegram.
August 2022. Hackers targeted the website of Ukraine’s state energy agency responsible for the oversight of Ukraine’s nuclear power plants. The agency stated Russian hackers carried out the attack.
August 2022. Hackers targeted the website of the Latvian Parliament with a DDoS attack that temporarily paralyzed the website’s server. A Russian hacking group claimed responsibility for the attack on Telegram.
August 2022. Hackers targeted Greece’s largest natural gas distributor DESFA causing a system outage and data exposure.
August 2022. A Russian group claimed responsibility for breaching a privately owned UK water supply company South Staffordshire Water and leaking files in an extortion attempt.
August 2022. Hackers targeted Montenegro’s government institutions, breaching the computer systems of several state bodies. Montenegro’s Defense Minister stated there was sufficient evidence to suspect Russia was behind the attack.
August 2022. A DDoS campaign targeted the websites of both government and private Estonian institutions. Estonia stated that the attack was largely repelled, and the impact was limited.
August 2022. Hackers used phishing emails to deploy malware in government institutions and defense firms throughout Eastern Europe in January 2022. A report by Russian-based company Kaspersky linked the campaign to a Chinese hacking group.
July 2022. Hackers targeted the Pakistan Air Force (PAF) in a spearfishing campaign to deploy malware and obtain sensitive files. Pakistani and Chinese organizations claimed the attack came from Indian-linked hackers.
July 2022. Hackers targeted Iran’s Islamic Culture and Communication Organization (ICCO). The attack took down at least 6 websites, placed images of Iranian resistance leaders on fifteen additional sites, wiped databases and computers, and allowed hackers to obtain access to sensitive ICCO data.
July 2022. A hacker claimed to acquire records on 1 billion Chinese from a Shanghai police database and posted the data for sale online.
July 2022. Belgium’s Foreign Ministry accused China of a cyberespionage campaign against Belgian targets, including Belgium’s Ministries of Interior and Defense. A spokesperson for the Chinese Embassy in Belgium denied the accusations.
July 2022. Hackers targeted social media accounts owned by the British Royal Army. The attack included the takeover of the British Army’s Twitter and YouTube accounts.
July 2022. Hackers targeted Lithuania’s state-owned energy provider in a DDoS attack. Killnet, which Lithuanian officials link to Russia, claimed responsibility for the attack.
July 2022. Hackers temporarily took down websites belonging to the Albanian Prime Minister's Office and the Parliament, and the e-Albania portal used to access public services.
July 2022. Hackers breached a Ukrainian media company to broadcast on multiple radio stations that Ukrainian President Volodymyr Zelenskyy was in critical condition. Zelenskyy refuted the claims and blamed Russia for the attack.
July 2022. China stated the United States stole 97 billion pieces of global internet data and 124 billion pieces of telephone data in June, specifically blaming the National Security Agency (NSA)'s Office of Tailored Access Operations (TAO).
June 2022. Hackers targeted Lithuania’s state railway, airports, media companies, and government ministries with DDoS attacks. A Russian-backed hacking group claimed responsibility for the attack.
June 2022. The FBI, National Security Agency (NSA) and CISA announced that Chinese state-sponsored hackers targeted and breached major telecommunications companies and network service providers since at least 2020.
June 2022. Hackers targeted former Israeli officials, military personnel, and a former U.S. Ambassador to Israel. An Israeli cybersecurity firm stated Iranian-linked actors used a phishing campaign to gain access to the targets’ inboxes, personally identifiable information, and identity documents.
June 2022. Hackers targeted three Iranian steel companies, forcing the country’s state-owned plant to halt production.
June 2022. Hackers leaked files and photos known as “The Xinjiang Police Files” displaying human rights abuses committed by the Chinese government against the Uyghur population.
June 2022. An attack targeted users of Australia’s largest Chinese-language platform, Media Today. The hackers made over 20 million attempts to reset user passwords in the platform’s registration system.
June 2022. Hackers targeted municipal public address systems in Jerusalem and Eliat, triggering the air raid sirens systems throughout both cities. An Israeli industrial cybersecurity firm attributed the attack to Iran.
June 2022. A Chinese-linked disinformation campaign targeted Australian mining company Lynas Rare Earths. The campaign included spreading disinformation on social media platforms and websites regarding Lynas Rare Earths’ alleged environmental record.
June 2022. Hackers targeted Harmony’s Horizon, a blockchain bridge, accessing personal data that ultimately led to the theft of approximately $100 million. Blockchain analytics firm Elliptic linked North Korea to the attack.
June 2022. A phishing campaign targeted U.S. organizations in military, software, supply chain, healthcare, and pharmaceutical sectors to compromise Microsoft Office 365 and Outlook accounts.
June 2022. Hackers compromised accounts belonging to officials in Germany’s Greens party, including ones used previously by Annalena Baerbock and Robert Habeck, who now serve as Minister for Foreign Affairs and Minister for Economic Affairs and Climate Action.
June 2022. Hackers targeted Norwegian public institutions with DDoS attacks, disrupting government websites. The Norwegian NSM security authority attributed the attack to pro-Russian hackers.
May 2022. A DDoS attack targeted the Port of London Authority, forcing its website to go offline. A group linked to Iran took responsibility for the hack.
May 2022. A phishing campaign targeted the Jordan Ministry of Foreign Affairs. Researchers attributed the attack to an Iranian cyber espionage actor.
May 2022. The Ethiopian Information Network Security Agency (INSA) stated hackers targeted the Grand Ethiopian Renaissance Dam (GERD). Ethiopia’s communications security agency thwarted the attacks before hackers could gain access to the networks.
May 2022. Hackers targeted Greenland’s healthcare system, causing networks to crash throughout the island. While an initial diagnosis determined the attack did not damage or expose citizens’ data, it made health services severely limited.
May 2022. A Chinese hacking group stole intellectual property assets from U.S and European companies since 2019 and went largely undetected. Researchers believe the group is backed by the Chinese government.
May 2022. State-sponsored hackers took down RuTube, the Russian version of YouTube, according to the company.
May 2022. Russian hackers hit Italian websites with a DDoS attack, including the Senate, the Ministry of Defence and the National Health Institute. The group states its goal was to target NATO countries and Ukraine.
April 2022. The Romanian National Directorate of Cyber Security said that multiple public and private sector websites were hit with DDoS attacks. The victims included the ministry of defense, border police, national railway company, and the OTP Bank. A group claiming credit for the attack said on Telegram that it hacked the websites because Romania supported Ukraine since the Russian invasion of the country.
April 2022. Cybersecurity researchers identified a new campaign by Russian-linked hackers that started in January and targets diplomats and embassy officials from France, Poland, Portugal, and other countries. The hacks started with a phishing email to deliver a malware-laden file to the target.
April 2022. Iranian state television claimed that the government foiled cyber intrusions that targeted more than 100 public sector agencies. They provided no further information on the incident.
April 2022. Russian hackers targeted the Costa Rican Ministry of Finance in a cyberattack, crippling tax collection and export systems. The newly elected President of Costa Rica declared a national emergency as a result of the attack and the group asked for $20 million in ransom or it plans to leak the stolen data.
April 2022. Hackers targeted members of the European Commission with spyware developed by NSO Group. An Apple notification from November to thousands of iPhone users stating they were targeted by state-sponsored actor alerted the Commission of this spyware use.
April 2022. A North Korea-linked hacking campaign using phishing emails sent from fake job recruiters targeted chemical companies in South Korea.
April 2022. A Citizen Lab study discovered actors used NSO Group spyware to target at least 65 Catalonian activists and political figures.
April 2022. The U.S. Treasury Department’s Office of Foreign Assets Control attributed the March 29 hack of Ronin Network to a North Korean hacking group and announced sanctions against the hackers. The group stole over $540 million in Ethereum and USDC.
April 2022. Hackers launched DDoS attacks against websites belonging to the Finnish Ministries of Defence and Foreign Affairs. The attack’s botnet used over 350 IP addresses from around the world and the denial of service was sustained for four hours.
April 2022. Hamas-linked cyber actors used a network of fake Facebook and Twitter profiles to surveil members of the Israeli security establishment. The actors also used WhatsApp to grow trust with their targets, then requesting them to obtain an app with malware.
April 2022. Hackers targeted the Telegram accounts of Ukrainian government officials with a phishing attack in an attempt to gain access to the accounts.
April 2022. Cybersecurity researchers observed hackers penetrating the networks of at least 7 Indian State Load Dispatch Centres (SLDCs) which oversee operations for electrical grid control. The SLDCs manage SCADA systems and researchers suggested that PLA-linked hackers may be involved.
April 2022. A social media platform disrupted two Iranian-linked cyber espionage campaigns that targeted activists, academics, and private companies. The campaign targeted businesses in the energy, semiconductor, and telecom sectors in countries including the U.S., Israel, Russia, and Canada by using phishing and other social engineering techniques.
April 2022. A group targeted several Ukrainian media organizations in an attempt to gain long-term access to their networks and collect sensitive information, according to researchers. The group has connections to the Russian GRU.
April 2022. The United States removed Russian malware from computer networks around the world, a move made public by made public by Attorney General Merrick B. Garland. While it is unclear what the malware’s intention was, authorities noted it could be used from anything from surveillance to destructive attacks. The malware created a botnet controlled by the Russian GRU.
April 2022. Hackers targeted a Ukrainian energy facility, but CERT-UA and private sector assistance largely thwarted attempts to shutdown electrical substations in Ukraine. Researchers believe the attack came from the same group with ties to the Russian GRU that targeted Ukraine’s power grid in 2016, using an updated form of the same malware.
April 2022: Hackers targeted Ukraine’s National Post Office with a DDoS attack, days after releasing a new stamp honoring a Ukrainian border guard. Th attack affected the agency’s ability to run their online store.
March 2022. Hackers used a DDoS attack to shut down the National Telecommunications Authority of the Marshall Islands. The attack disrupted internet services on the Islands for over a week.
March 2022. Pakistani government-linked hackers targeted Indian government employees in an espionage operation. The group also created fake government and military websites to deliver malware to their targets.
March 2022. An attack on a satellite broadband service run by the American company Viasat disrupted internet services across Europe, including Ukrainian military communications at the start of the Russian invasion. The attackers hacked satellite modems belonging to thousands of Europeans to disrupt the company’s service.
March 2022. Hackers penetrated the websites belong to multiple Russian agencies including the Energy Ministry, the Federal State Statistics Service, the Federal Penitentiary Service, and the Federal Bailiff Service. The websites displayed several anti-government and anti-invasion images and messages before the agencies were able to expel the attackers.
March 2022. Hackers targeted Greenland’s parliamentary authority in an apparent espionage operation, forcing the parliament to cancel meetings and slowing social benefit payments.
March 2022. The National Computer Network Emergency Response Technical Team/Coordination Center of China (CNCERT/CC) stated that hackers from the United States targeted Chinese computers to carry out attacks on Russia, Ukraine, and Belarus.
March 2022. The European Banking Authority was targeted using a vulnerability in Microsoft’s mail server software, but no data was compromised. Various attacks using this vulnerability have been attributed to a Chinese government-backed actor.
March 2022. The U.S. Department of Justice charged four Russian government employees involved in hacking campaigns that took place between 2012 and 2018. The hacks targeted critical infrastructure companies and organizations largely in the energy sector. The hackers sought to install backdoors and deploy malware in the operational technology of their targets.
March 2022. Hackers defaced and disrupted several Russian government and state media websites, according to the Russian Ministry of Digital Development and Communications. The Emergency Situations Ministry website was hacked, and the attackers wrote messages encouraging Russian soldiers to defect. Tass, a state-run news agency, was also penetrated and hackers displayed a call for people to “take to the streets against the war.”
March 2022. The National Research Council, Canada’s biggest state-funded research agency, shared that hackers penetrated its networks. An announcement on the Council’s website explained that parts of its online presence were taken offline as a result of this incident.
March 2022. Hackers linked to the Chinese government penetrated the networks belonging to government agencies of at least 6 different U.S. states in an espionage operation. Hackers took advantage of the Log4j vulnerability to access the networks, in addition to several other vulnerable internet-facing web applications.
March 2022. Hackers used a DDoS attack to target a major Israeli telecommunication provider. As a result, multiple Israeli government websites were taken offline.
February 2022. Researchers identified campaigns by two North Korean government-backed groups targeting employees across numerous media, fintech, and software companies. The hackers used phishing emails advertising fake job opportunities and exploited a vulnerability in Google Chrome to compromise the companies’ websites and spread malware.
February 2022. The websites of the Ukrainian Cabinet of Ministers and Ministries of Foreign Affairs, Infrastructure, and Education were disrupted in the days before Russian troops invaded Ukraine. Wiper malware was also used to penetrate the networks of one Ukrainian financial institution and two government contractors.
February 2022. A Beijing-based cybersecurity company accused the U.S. National Security Agency of engineering a backdoor to monitor companies and governments in over 45 countries around the world. A Foreign Ministry spokesman said that operations like this may threaten the security of China’s critical infrastructure and compromise trade secrets.
February 2022. On February 15, a DDoS attack knocked websites belonging to the Ukrainian Defense Ministry and two of the country’s largest banks offline. The U.S. and the UK attributed the attack to the Russian GRU. The Ukrainian Cyber Police claimed that the attack was connected to another “information attack” where Ukrainian citizens received spam text messages claiming that ATMs were not working.
February 2022. A Beijing-based cybersecurity company accused the U.S. National Security Agency of engineering a back-door to monitor companies and governments in over 45 countries around the world. A Foreign Ministry spokesman said that operations like this may threaten the security of China’s critical infrastructure and compromise trade secrets.
February 2022. A Pakistani group deployed a remote access trojan to conduct espionage against Indian military and diplomatic targets. The group generally uses social engineering and/or USB-based worms to penetrate a network.
February 2022. An Iranian-linked group conducted espionage and other malicious cyber operations against a range of private companies and local and federal governments.
February 2022. Russian state-sponsored actors hacked into numerous U.S. defense contractors between January 2020 and February 2022. The hackers exfiltrated emails and sensitive data relating to the companies’ export-controlled products and proprietary information and interactions with foreign governments.
February 2022. Multiple oil terminals in some of Europe’s biggest ports across Belgium and Germany fell victim to a cyberattack, rendering them unable to process incoming barges. A ransomware strain associated with a Russian-speaking hacking group was used to disrupt the ability of energy companies to process payments.
February 2022. Since October 2021, a hacking group targeted Palestinian individuals and organizations with malware. Researchers suggest that the operation could be connected to a broader campaign by a hacking group commonly attributed to the cyber arm of Hamas that started in 2017.
February 2022. A U.N. report claimed that North Korea hackers stole more than $50 million between 2020 and mid-2021 from three cryptocurrency exchanges. The report also added that in 2021 that amount likely increased, as the DPRK launched 7 attacks on cryptocurrency platforms to help fund their nuclear program in the face of a significant sanctions regime.
February 2022. An investigation led by Mandiant discovered that hackers linked to the Chinese-government compromised email accounts belonging to Wall Street Journal journalists. The hackers allegedly surveilled and exfiltrated data from the newspaper for over two years beginning in at least February 2020.
February 2022. The networks of the U.K. Foreign Office were penetrated by hackers. All details of the incident remain confidential.
Crossref Citations
Haigh, Ivan D. Wadey, Matthew P. Wahl, Thomas Ozsoy, Ozgun Nicholls, Robert J. Brown, Jennifer M. Horsburgh, Kevin and Gouldby, Ben 2016. Spatial and temporal analysis of extreme sea level and storm surge events around the coastline of the UK. Scientific Data, Vol. 3, Issue. 1,
Hall, Jim W. Thacker, Scott Ives, Matt C. Cao, Yue Chaudry, Modassar Blainey, Simon P. and Oughton, Edward J. 2017. Strategic analysis of the future of national infrastructure. Proceedings of the Institution of Civil Engineers - Civil Engineering, Vol. 170, Issue. 1, p. 39.
Oughton, Edward Frias, Zoraida Russell, Tom and Cleevely, David D. 2017. Uncertainty in the UKKs National Infrastructure Assessment of Mobile Telecommunication Infrastructure: From LTE to 5G and Beyond. SSRN Electronic Journal ,
Lamb, Rob Aspinall, Willy Odbert, Henry and Wagener, Thorsten 2017. Vulnerability of bridges to scour: insights from an international expert elicitation workshop. Natural Hazards and Earth System Sciences, Vol. 17, Issue. 8, p. 1393.
Eggimann, Sven Mutzner, Lena Wani, Omar Schneider, Mariane Yvonne Spuhler, Dorothee Moy de Vitry, Matthew Beutler, Philipp and Maurer, Max 2017. The Potential of Knowing More: A Review of Data-Driven Urban Water Management. Environmental Science & Technology, Vol. 51, Issue. 5, p. 2538.
Grabowski, Z. J. Matsler, A. M. Thiel, C. McPhillips, L. Hum, R. Bradshaw, A. Miller, T. and Redman, C. 2017. Infrastructures as Socio-Eco-Technical Systems: Five Considerations for Interdisciplinary Dialogue. Journal of Infrastructure Systems, Vol. 23, Issue. 4,
Barlow, Janet F. Shao, Li and Smith, Stefan Thor 2018. Sustainable Futures in the Built Environment to 2050. p. 25.
Oughton, Edward J. Usher, Will Tyler, Peter and Hall, Jim W. 2018. Infrastructure as a Complex Adaptive System. Complexity, Vol. 2018, Issue. , p. 1.
Tran, Martino Hall, Jim Nicholls, Robert Hickford, Adrian J. Chaudry, Modassar and Watson, Geoff 2018. Sustainable Futures in the Built Environment to 2050. p. 117.
Rogers, Chris DF 2018. Engineering future liveable, resilient, sustainable cities using foresight. Proceedings of the Institution of Civil Engineers - Civil Engineering, Vol. 171, Issue. 6, p. 3.
Ives, Matthew C. Simpson, Mike and Hall, Jim W. 2018. Navigating the water trilemma: a strategic assessment of long-term national water resource management options for Great Britain. Water and Environment Journal, Vol. 32, Issue. 4, p. 546.
Dawson, Richard J. Thompson, David Johns, Daniel Wood, Ruth Darch, Geoff Chapman, Lee Hughes, Paul N. Watson, Geoff V. R. Paulson, Kevin Bell, Sarah Gosling, Simon N. Powrie, William and Hall, Jim W. 2018. A systems framework for national assessment of climate risks to infrastructure. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, Vol. 376, Issue. 2121, p. 20170298.
Hickford, Adrian J. Blainey, Simon P. Ortega Hortelano, Alejandro and Pant, Raghav 2018. Resilience engineering: theory and practice in interdependent infrastructure systems. Environment Systems and Decisions, Vol. 38, Issue. 3, p. 278.
Thacker, Scott Adshead, Daniel Fay, Marianne Hallegatte, Stéphane Harvey, Mark Meller, Hendrik O’Regan, Nicholas Rozenberg, Julie Watkins, Graham and Hall, Jim W. 2019. Infrastructure for sustainable development. Nature Sustainability, Vol. 2, Issue. 4, p. 324.
Hall, Jim 2019. A Simulation Tool to Guide Infrastructure Decisions: System-of-Systems Modeling Aids Prioritization and Uncertainty Planning. IEEE Systems, Man, and Cybernetics Magazine, Vol. 5, Issue. 3, p. 10.
Furtado, Bernardo A. Fuentes, Miguel A. and Tessone, Claudio J. 2019. Policy Modeling and Applications: State-of-the-Art and Perspectives. Complexity, Vol. 2019, Issue. , p. 1.
Lamperti, Francesco Mazzucato, Mariana Roventini, Andrea and Semieniuk, Gregor 2019. The green transition: public policy, finance, and the role of the State. Vierteljahrshefte zur Wirtschaftsforschung, Vol. 88, Issue. 2, p. 73.
van den Boomen, Martine Spaan, Matthijs T. J. Shang, Yue and Wolfert, A. R. M. 2020. Infrastructure maintenance and replacement optimization under multiple uncertainties and managerial flexibility. Construction Management and Economics, Vol. 38, Issue. 1, p. 91.
Maniatis, Georgios Williams, Richard D. Hoey, Trevor B. Hicks, John and Carroll, William 2020. A decision support tool for assessing risks to above-ground river pipeline crossings. Proceedings of the Institution of Civil Engineers - Water Management, Vol. 173, Issue. 2, p. 87.
Fenner, Richard and Ainger, Charles 2020. A review of sustainability in civil engineering: why much more commitment is needed. Proceedings of the Institution of Civil Engineers - Civil Engineering, Vol. 173, Issue. 2, p. 69.