Cyber Weapons Could Create Devastation Comparable To A Nuclear Strike

Understandably, many people are concerned about the possibilities of nuclear conflict and this is very worrying, but a severe cyber war could also be as disastrous as a nuclear strike. Russia and the United States have abandoned recent discussions without agreement over intemediate nuclear weapons and both are now developing new nuclear weapons.

Also, the serious problems with Iran and North Korea that have created a new nuclear arms race and the nuclear threats have risen significantly. 

These threats are very serious, however, cyber threats could be just as dangerous, yet currently this is less understood by some governments and the global public. 

In the recent past most independent or government hackers have so far stolen data, money and-or, tried ransom threats.  But now hackers have put malware into US, Russian and other government power and water systems and this has serious potential consequences. 

Whereas most nuclear weapons if used in warfare would vaporise people within 100 feet and kill everyone within half a mile, however, most cyber- attacks would be suck as people dying from car crashes as traffic light systems are hacked, or people would die from lack of food or heat when power plants are hacked and taken off-line.

 In early 2016, hackers took over a US water drinking treatment plant, and if it had not been detected, it would have poisoned and killed a large number of people. In 2016 and 2017, hackers shut down the Ukrainian power grid.  In 2018, cyber-criminals gained access to the UK electricity system and in 2019 a similar attack happened to the US power grid.  These attacks have not stopped and oil and gas pipelines have been attacked and hacker have attempted hits on nuclear power plants.

Nuclear Rated Cyber-Attacks
There are three basic scenarios for how a nuclear grade cyber-attack might develop. It could start modestly, with one country’s intelligence service stealing, deleting or compromising another nation’s military data. Successive rounds of retaliation could expand the scope of the attacks and the severity of the damage to civilian life.

In another situation, a nation or a terrorist organisation could unleash a massively destructive cyber-attack, targeting several electricity utilities, water treatment facilities or industrial plants at once, or in combination with each other to compound the damage. 

Perhaps the most concerning possibility, though, is that it might happen by mistake. 

Just as there is no way to completely protect against a nuclear attack, there are only some ways to make devastating cyberattacks less likely.

Governments, businesses and regular people need to secure their systems to prevent outside intruders from finding their way in, and then exploiting their connections and access to dive deeper. 

If the world is to reduce the risk of serious cyber-attacks, including some with the potential to be as damaging as a nuclear strike, it will be up to each person, each company, each government agency to work on its own and together to secure the vital systems on which people’s lives depend.

The Conversation:        Science Alert:

You Might Also Read: 

The Destabilizing Danger Of Cyberattacks On Missile Systems:

Cyber Threats And Nuclear Weapons Systems:

 

« A Major Breach In Biometrics Security Database
Five Features Of The Changing Threat Landscape »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cambray Solutions

Cambray Solutions

Cambray Solutions specializes in locating and securing technical professionals, managers, and executives.

International Security Management Association (ISMA)

International Security Management Association (ISMA)

ISMA is an international security association of senior security executives from major business organizations located worldwide.

Spirion

Spirion

Spirion offers data discovery, classification, and protection tools for your business's privacy, security, and compliance program to avoid gaps and risks.

Arsenal Insurance Company

Arsenal Insurance Company

Arsenal is an insurance provider based in Moscow, Russia. Services offered include Cyber Risk insurance.

SIGA

SIGA

SIGA provides cyber security solutions for Industrial Control Systems SCADA systems used in critical infrastructures and industrial processes.

Network Integrated Business Solutions (NIBS)

Network Integrated Business Solutions (NIBS)

NIBS is an IT services provider offering a range of services with the aim of simplifying and securing technology.

AVORD

AVORD

AVORD is a cloud-based security testing platform that allows clients to manage security testing requirements in a far more productive and efficient way.

APT Search

APT Search

APT Search is a recruitment company specialising within the Legal Technology, Cybersecurity and Privacy sectors.

Empiric

Empiric

Empiric is a multi-award winning technology and transformation recruitment agency specialising in data, digital, cloud and security.

Blockchain Research Institute (BRI)

Blockchain Research Institute (BRI)

Blockchain Research Institute (BRI) is an independent, global think-tank. We bring together the world’s top global researchers to undertake ground-breaking research on blockchain technology.

World Informatix Cyber Security (WICS)

World Informatix Cyber Security (WICS)

World Informatix Cyber Security provides a range of cyber security services to protect valuable information assets to global business and governments.

Phy-Cy.X Security Group

Phy-Cy.X Security Group

Phy-Cy.X specialize in the “Physics” of Information Security through both physical and cyber domains. We are not an IT company, we ARE an Information Security company.

Kontron

Kontron

Kontron offers a combined portfolio of secure hardware, middleware and services for Internet of Things (IoT) and Industry 4.0 applications.

FPG Technologies & Solutions

FPG Technologies & Solutions

FPG Technology is a technology solutions provider and systems integrator, specializing in delivering IT Consulting, IT Security, Cloud, Mobility, Infrastructure solutions and services.

Federal Bureau of Investigation (FBI)

Federal Bureau of Investigation (FBI)

The mission of the FBI is to protect and defend against intelligence threats, uphold and enforce criminal laws, and provide criminal justice services.

NetApp

NetApp

The NetApp portfolio includes intelligent cloud services, data services, and storage infrastructure that helps organizations manage applications and data everywhere across hybrid cloud environments.

Sayers

Sayers

Sayers is best known for its ability to solve business challenges with IT solutions. Our areas of expertise include cloud, storage, virtualization, security, mobility and networking.

Recast Software

Recast Software

Recast Software exists to simplify the work of IT teams and enable them to create highly secure and compliant environments.