

(c) unauthorised destruction, damage, deletion or the change of MOD Identifiable Information residing in an information system or electronic communications network (b) disruption or change of the operation (including but not limited to takeover of control) of an information system or electronic communications network on which MOD Identifiable Information resides (a) unauthorised access to an information system or electronic communications network on which MOD Identifiable Information resides “Cyber Security Incident” means an event, act or omission which gives rise or may give rise to: “Cyber Implementation Plan” means the plan referred to in Clause 3 of this Condition. “Cyber Risk Profile” means the level of cyber risk relating to this Contract assessed by the Authority or in relation to any Sub-contract assessed by the Contractor, in each case in accordance with the Cyber Security Model. (b) any parent undertaking or subsidiary undertaking of the Contractor from time to time within the meaning of section 1162 Companies Act 2006 and it is further agreed that where the ownership of shares in any such undertaking have been pledged or transferred to a third party by way of security, the original parent shall still be considered a member of the subsidiary undertaking (a) any associated company of the Contractor from time to time within the meaning of Section 449 of the Corporate Tax Act 2010 or any subordinate legislation and In this Condition the following words and expressions shall have the meanings given to them, except where the context requires a different meaning: Everyone looks to each other in a state of nervous suspense and paranoid accusation.1.1. This is an extremely difficult task since launching an attack on the enemy exposes the positions of your own Ground Silos, Subs and Bombers the moment they launch nuclear weapons, making you extremely vulnerable and exposed to a crushing counter-attack.ĭesperate attempts must be made to form fast, tactical alliances, alliances that may at any moment break-down to become the treacherous and most deadly of betrayals.

In order to win you must wipe out the enemy population and simultaneously disable the enemy's ability to retaliate against you. Points are awarded or lost depending on both the efficacy and thoroughness of your nuclear vendetta and the number of your own civilian deaths. Your mission is to successfully exterminate your enemy's civilian population whilst saving your own. You play a General hidden deep within an underground bunker. Inspired by the 1983 cult classic film, Wargames, DEFCON superbly evokes the tension, paranoia and suspicion of the Cold War era, playing on the fascinating aspects of psychological gameplay that occur during strategic nuclear warfare.
