Cyber Weapons Could Create Devastation Comparable To A Nuclear Strike

Understandably, many people are concerned about the possibilities of nuclear conflict and this is very worrying, but a severe cyber war could also be as disastrous as a nuclear strike. Russia and the United States have abandoned recent discussions without agreement over intemediate nuclear weapons and both are now developing new nuclear weapons.

Also, the serious problems with Iran and North Korea that have created a new nuclear arms race and the nuclear threats have risen significantly. 

These threats are very serious, however, cyber threats could be just as dangerous, yet currently this is less understood by some governments and the global public. 

In the recent past most independent or government hackers have so far stolen data, money and-or, tried ransom threats.  But now hackers have put malware into US, Russian and other government power and water systems and this has serious potential consequences. 

Whereas most nuclear weapons if used in warfare would vaporise people within 100 feet and kill everyone within half a mile, however, most cyber- attacks would be suck as people dying from car crashes as traffic light systems are hacked, or people would die from lack of food or heat when power plants are hacked and taken off-line.

 In early 2016, hackers took over a US water drinking treatment plant, and if it had not been detected, it would have poisoned and killed a large number of people. In 2016 and 2017, hackers shut down the Ukrainian power grid.  In 2018, cyber-criminals gained access to the UK electricity system and in 2019 a similar attack happened to the US power grid.  These attacks have not stopped and oil and gas pipelines have been attacked and hacker have attempted hits on nuclear power plants.

Nuclear Rated Cyber-Attacks
There are three basic scenarios for how a nuclear grade cyber-attack might develop. It could start modestly, with one country’s intelligence service stealing, deleting or compromising another nation’s military data. Successive rounds of retaliation could expand the scope of the attacks and the severity of the damage to civilian life.

In another situation, a nation or a terrorist organisation could unleash a massively destructive cyber-attack, targeting several electricity utilities, water treatment facilities or industrial plants at once, or in combination with each other to compound the damage. 

Perhaps the most concerning possibility, though, is that it might happen by mistake. 

Just as there is no way to completely protect against a nuclear attack, there are only some ways to make devastating cyberattacks less likely.

Governments, businesses and regular people need to secure their systems to prevent outside intruders from finding their way in, and then exploiting their connections and access to dive deeper. 

If the world is to reduce the risk of serious cyber-attacks, including some with the potential to be as damaging as a nuclear strike, it will be up to each person, each company, each government agency to work on its own and together to secure the vital systems on which people’s lives depend.

The Conversation:        Science Alert:

You Might Also Read: 

The Destabilizing Danger Of Cyberattacks On Missile Systems:

Cyber Threats And Nuclear Weapons Systems:

 

« A Major Breach In Biometrics Security Database
Five Features Of The Changing Threat Landscape »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Versasec

Versasec

Versasec is a leader in identity and access management, providing customers with security solutions for managing digital identities.

ID-SIRTII/CC

ID-SIRTII/CC

Security Incident Response Team for Internet Infrastructure in Indonesia.

IABG

IABG

IABG offer independent, product-neutral consulting as well as technical and scientific services for the use of safety-relevant systems and technologies.

Cyber 2.0

Cyber 2.0

Cyber 2.0 is the only system in the world that blocks all forms of cyber attack within the organization, including new and unfamiliar attack methods.

TorGuard

TorGuard

TorGuard is a Virtual Private Network services provider offering secure encrypted access to the internet.

Civic Technologies

Civic Technologies

Civic’s Secure Identity Platform (SIP) uses a verified identity for multi-factor authentication on web and mobile apps without the need for usernames or passwords.

CyberMDX

CyberMDX

CyberMDX delivers proactive security built for hospital devices. 360° visibility, insight, and protection for all connected hospital technologies.

Sontiq

Sontiq

Sontiq is committed to providing best-in-class, highly scalable, award-winning identity security solutions to consumers, businesses and government agencies.

YorCyberSec

YorCyberSec

YorCyberSec act as a trusted Cyber and Information Security broker and procurement specialist. We help companies to Reduce Risk, Increase Assurance and Improve Performance.

Cyber Security Services

Cyber Security Services

Cyber Security Services is a cyber security consulting firm and security operations center (SOC).

Bright Data

Bright Data

Bright Data Inc is the world’s #1 web data platform, enabling organizations to research, monitor, analyze data, and make better decisions.

ECIT

ECIT

ECIT is your preferred provider of finance and IT services. We believe in the value of combining financial and IT services to streamline and improve the operation of your business.

Ever Nimble

Ever Nimble

Ever Nimble are award-winning experts in IT support, cybersecurity, and cloud technology. Our proactive approach will enhance your security and protect you from cyber security threats.

Scope AI

Scope AI

Scope AI is an innovative technology company specializing in quantum security and machine learning.

Seers

Seers

Seers is the world’s leading privacy & consent management platform for companies worldwide. Trusted by over 50,000+ businesses.

SECUREU

SECUREU

At SECUREU, we protect growing businesses against cyberattacks by proactively implementing best security practices, fixing existing security vulnerabilities, and increasing cyber awareness.