Cyber Weapons Could Create Devastation Comparable To A Nuclear Strike

Understandably, many people are concerned about the possibilities of nuclear conflict and this is very worrying, but a severe cyber war could also be as disastrous as a nuclear strike. Russia and the United States have abandoned recent discussions without agreement over intemediate nuclear weapons and both are now developing new nuclear weapons.

Also, the serious problems with Iran and North Korea that have created a new nuclear arms race and the nuclear threats have risen significantly. 

These threats are very serious, however, cyber threats could be just as dangerous, yet currently this is less understood by some governments and the global public. 

In the recent past most independent or government hackers have so far stolen data, money and-or, tried ransom threats.  But now hackers have put malware into US, Russian and other government power and water systems and this has serious potential consequences. 

Whereas most nuclear weapons if used in warfare would vaporise people within 100 feet and kill everyone within half a mile, however, most cyber- attacks would be suck as people dying from car crashes as traffic light systems are hacked, or people would die from lack of food or heat when power plants are hacked and taken off-line.

 In early 2016, hackers took over a US water drinking treatment plant, and if it had not been detected, it would have poisoned and killed a large number of people. In 2016 and 2017, hackers shut down the Ukrainian power grid.  In 2018, cyber-criminals gained access to the UK electricity system and in 2019 a similar attack happened to the US power grid.  These attacks have not stopped and oil and gas pipelines have been attacked and hacker have attempted hits on nuclear power plants.

Nuclear Rated Cyber-Attacks
There are three basic scenarios for how a nuclear grade cyber-attack might develop. It could start modestly, with one country’s intelligence service stealing, deleting or compromising another nation’s military data. Successive rounds of retaliation could expand the scope of the attacks and the severity of the damage to civilian life.

In another situation, a nation or a terrorist organisation could unleash a massively destructive cyber-attack, targeting several electricity utilities, water treatment facilities or industrial plants at once, or in combination with each other to compound the damage. 

Perhaps the most concerning possibility, though, is that it might happen by mistake. 

Just as there is no way to completely protect against a nuclear attack, there are only some ways to make devastating cyberattacks less likely.

Governments, businesses and regular people need to secure their systems to prevent outside intruders from finding their way in, and then exploiting their connections and access to dive deeper. 

If the world is to reduce the risk of serious cyber-attacks, including some with the potential to be as damaging as a nuclear strike, it will be up to each person, each company, each government agency to work on its own and together to secure the vital systems on which people’s lives depend.

The Conversation:        Science Alert:

You Might Also Read: 

The Destabilizing Danger Of Cyberattacks On Missile Systems:

Cyber Threats And Nuclear Weapons Systems:

 

« A Major Breach In Biometrics Security Database
Five Features Of The Changing Threat Landscape »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IOActive

IOActive

IOActive serves as a trusted security advisor to the Global 500 and other progressive enterprises, helping to safeguard their most important assets and improve their overall security posture.

RedTeam Security

RedTeam Security

RedTeam Security is a provider of Penetration Testing, Social Engineering, Red Teaming and Red Team Training services.

Global Secure Solutions (GSS)

Global Secure Solutions (GSS)

Global Secure Solutions is an IT security and risk consulting firm and authorised ISO training partner for the PECB.

Orange Cyberdefense

Orange Cyberdefense

Orange Cyberdefense is the expert cybersecurity business unit of the Orange Group, providing managed security, managed threat detection & response services to organizations around the globe.

Secmentis

Secmentis

Secmentis is a cyber security consultancy specializing in penetration testing, threat intelligence, and proactive defense for your IT infrastructure.

Nexcom International

Nexcom International

Nexcom operates six global businesses - IoT Automation, Intelligent Digital Security, Internet of Things, Intelligent Platform & Services, Mobile Computing Solutions, Network & Communications.

redGuardian

redGuardian

redGuardian is a DDoS mitigation solution available both as a BGP-based service and as an on-premise platform.

Veritas Technologies

Veritas Technologies

Veritas provide industry-leading solutions that cover all platforms with backup and recovery, business continuity, software-defined storage and information governance.

OpenZeppelin

OpenZeppelin

OpenZeppelin builds developer tools and performs security audits for distributed systems that power multimillion-dollar economies.

689cloud

689cloud

689Cloud is a cloud content collaboration platform that allows users to protect, track, and control files AFTER they have been shared.

Conference on Applied Machine Learning in Information Security (CAMLIS)

Conference on Applied Machine Learning in Information Security (CAMLIS)

CAMLIS is a venue for discussing applied research on machine learning, deep learning and data science in information security.

Defscope

Defscope

Defscope is an Azerbaijani company entirely focused on cybersecurity offering training, security consulting, and other professional services.

Pivot Technology School

Pivot Technology School

Pivot Tech offers Data Analytics, Software Development and Cyber Security training in boot camp style cohorts.

Dimension Data

Dimension Data

Dimension Data is a leading African born technology provider operating in the Middle East and Africa, offering a portfolio of services including intelligent security solutions.

Anatomy IT

Anatomy IT

Anatomy IT empowers healthcare providers to deliver exceptional patient care with cutting-edge technology and cybersecurity solutions.

Creative Network Innovations (CNI)

Creative Network Innovations (CNI)

Creative Network Innovations is a leader in providing advanced IT and cybersecurity solutions.