Cyber Weapons Could Create Devastation Comparable To A Nuclear Strike

Understandably, many people are concerned about the possibilities of nuclear conflict and this is very worrying, but a severe cyber war could also be as disastrous as a nuclear strike. Russia and the United States have abandoned recent discussions without agreement over intemediate nuclear weapons and both are now developing new nuclear weapons.

Also, the serious problems with Iran and North Korea that have created a new nuclear arms race and the nuclear threats have risen significantly. 

These threats are very serious, however, cyber threats could be just as dangerous, yet currently this is less understood by some governments and the global public. 

In the recent past most independent or government hackers have so far stolen data, money and-or, tried ransom threats.  But now hackers have put malware into US, Russian and other government power and water systems and this has serious potential consequences. 

Whereas most nuclear weapons if used in warfare would vaporise people within 100 feet and kill everyone within half a mile, however, most cyber- attacks would be suck as people dying from car crashes as traffic light systems are hacked, or people would die from lack of food or heat when power plants are hacked and taken off-line.

 In early 2016, hackers took over a US water drinking treatment plant, and if it had not been detected, it would have poisoned and killed a large number of people. In 2016 and 2017, hackers shut down the Ukrainian power grid.  In 2018, cyber-criminals gained access to the UK electricity system and in 2019 a similar attack happened to the US power grid.  These attacks have not stopped and oil and gas pipelines have been attacked and hacker have attempted hits on nuclear power plants.

Nuclear Rated Cyber-Attacks
There are three basic scenarios for how a nuclear grade cyber-attack might develop. It could start modestly, with one country’s intelligence service stealing, deleting or compromising another nation’s military data. Successive rounds of retaliation could expand the scope of the attacks and the severity of the damage to civilian life.

In another situation, a nation or a terrorist organisation could unleash a massively destructive cyber-attack, targeting several electricity utilities, water treatment facilities or industrial plants at once, or in combination with each other to compound the damage. 

Perhaps the most concerning possibility, though, is that it might happen by mistake. 

Just as there is no way to completely protect against a nuclear attack, there are only some ways to make devastating cyberattacks less likely.

Governments, businesses and regular people need to secure their systems to prevent outside intruders from finding their way in, and then exploiting their connections and access to dive deeper. 

If the world is to reduce the risk of serious cyber-attacks, including some with the potential to be as damaging as a nuclear strike, it will be up to each person, each company, each government agency to work on its own and together to secure the vital systems on which people’s lives depend.

The Conversation:        Science Alert:

You Might Also Read: 

The Destabilizing Danger Of Cyberattacks On Missile Systems:

Cyber Threats And Nuclear Weapons Systems:

 

« A Major Breach In Biometrics Security Database
Five Features Of The Changing Threat Landscape »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

France Cybersecurity

France Cybersecurity

France Cybersecurity represents the French cybersecurity industry to raise international awareness of French cybersecurity capabilities and solutions.

FTAPI Software

FTAPI Software

FTAPI SecuTransfer is a software solution for end-to-end encrypted data exchange of large and sensitive data with customers and partners.

macmon secure

macmon secure

macmon secure develops network security software, focussing on Network Access Control.

miniOrange

miniOrange

miniOrange is a cloud and on-premise based identity and access management (IAM) solution provider.

AdaptiveMobile Security

AdaptiveMobile Security

AdaptiveMobile Security, a world leader in mobile network security, protecting more than 2.2 billion subscribers worldwide.

Estio Training

Estio Training

Estio Training is a specialist digital and IT apprenticeships provider, dedicated to introducing new skills and developing existing talent in businesses across the UK.

Forever Group

Forever Group

Forever Group is a Managed Services Provider specialising in Telecommunications, IT Support, and Cyber Security.

Speedinvest

Speedinvest

Speedinvest is one of Europe’s most active early-stage investors with a focus on Deep Tech, Fintech, Industrial Tech, Network Effects, and Digital Health.

Buchanan & Edwards

Buchanan & Edwards

Buchanan & Edwards delivers forward-focused technology solutions that help our clients transform the way they perform their missions.

ACL Digital

ACL Digital

ACL Digital, an ALTEN Group company, is a leader in design-led digital experience, innovation, enterprise modernization, and product engineering services converging to Technology, Media & Telecom.

Lansweeper

Lansweeper

Lansweeper is an IT Asset Management platform provider helping businesses better understand, manage and protect their IT devices and network.

Rampart AI

Rampart AI

Tackling DevSecOps Issues In Application Security. Rampart has revolutionized the shift left security approach, applying zero-trust to application development.

CNF Technologies

CNF Technologies

CNF Technologies is an award-winning cyber company providing technology-focused research and development to commercial, federal, and Department of Defense clients.

CyberSG TIG Centre

CyberSG TIG Centre

CyberSG TIG Centre aims to propel Singapore as the world’s premier cybersecurity innovation hub for economic growth.

Gcore

Gcore

Gcore is an international leader in public cloud and edge computing, content delivery, hosting, and security solutions.

Softsource vBridge

Softsource vBridge

Softsource vBridge are an ICT systems integrator providing specialist technology solutions, professional services, technical expertise and data centre services.