Cyber Weapons Could Create Devastation Comparable To A Nuclear Strike

Understandably, many people are concerned about the possibilities of nuclear conflict and this is very worrying, but a severe cyber war could also be as disastrous as a nuclear strike. Russia and the United States have abandoned recent discussions without agreement over intemediate nuclear weapons and both are now developing new nuclear weapons.

Also, the serious problems with Iran and North Korea that have created a new nuclear arms race and the nuclear threats have risen significantly. 

These threats are very serious, however, cyber threats could be just as dangerous, yet currently this is less understood by some governments and the global public. 

In the recent past most independent or government hackers have so far stolen data, money and-or, tried ransom threats.  But now hackers have put malware into US, Russian and other government power and water systems and this has serious potential consequences. 

Whereas most nuclear weapons if used in warfare would vaporise people within 100 feet and kill everyone within half a mile, however, most cyber- attacks would be suck as people dying from car crashes as traffic light systems are hacked, or people would die from lack of food or heat when power plants are hacked and taken off-line.

 In early 2016, hackers took over a US water drinking treatment plant, and if it had not been detected, it would have poisoned and killed a large number of people. In 2016 and 2017, hackers shut down the Ukrainian power grid.  In 2018, cyber-criminals gained access to the UK electricity system and in 2019 a similar attack happened to the US power grid.  These attacks have not stopped and oil and gas pipelines have been attacked and hacker have attempted hits on nuclear power plants.

Nuclear Rated Cyber-Attacks
There are three basic scenarios for how a nuclear grade cyber-attack might develop. It could start modestly, with one country’s intelligence service stealing, deleting or compromising another nation’s military data. Successive rounds of retaliation could expand the scope of the attacks and the severity of the damage to civilian life.

In another situation, a nation or a terrorist organisation could unleash a massively destructive cyber-attack, targeting several electricity utilities, water treatment facilities or industrial plants at once, or in combination with each other to compound the damage. 

Perhaps the most concerning possibility, though, is that it might happen by mistake. 

Just as there is no way to completely protect against a nuclear attack, there are only some ways to make devastating cyberattacks less likely.

Governments, businesses and regular people need to secure their systems to prevent outside intruders from finding their way in, and then exploiting their connections and access to dive deeper. 

If the world is to reduce the risk of serious cyber-attacks, including some with the potential to be as damaging as a nuclear strike, it will be up to each person, each company, each government agency to work on its own and together to secure the vital systems on which people’s lives depend.

The Conversation:        Science Alert:

You Might Also Read: 

The Destabilizing Danger Of Cyberattacks On Missile Systems:

Cyber Threats And Nuclear Weapons Systems:

 

« A Major Breach In Biometrics Security Database
Five Features Of The Changing Threat Landscape »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Bishop Fox

Bishop Fox

Bishop Fox provides tailored security consulting services to companies across all industries. Our customers include many of the top organizations in the world.

ReadWrite

ReadWrite

ReadWrite is a leading media platform dedicated to IoT and the Connected World.

ID-SIRTII/CC

ID-SIRTII/CC

Security Incident Response Team for Internet Infrastructure in Indonesia.

BSIMM

BSIMM

The Building Security In Maturity Model (BSIMM) is a study of existing software security initiatives.

ObserveIT

ObserveIT

ObserveIT helps companies identify & eliminate insider threats. Visually monitor & quickly investigate with our easy-deploy user activity monitoring solution.

Black Kite

Black Kite

Black Kite (formerly NormShield) provides comprehensive Security-as-a-Service solutions focused on cyber threat intelligence, vulnerability management and continuous perimeter monitoring.

The Media Trust

The Media Trust

The Media Trust continuously scans websites, ad tags and mobile apps and alerts on anomalies affecting websites and visitors.

Nouveau

Nouveau

Nouveau Solutions is a specialist IT managed services company with a strategic focus on delivering cloud, infrastructure, compliance, network and security solutions.

Cybersprint

Cybersprint

Cybersprint's Digital Risk Protection platform continuously monitors your digital footprint so you can make informed decisions on exposure to online threats, identify vulnerabilities and take action.

LUCY Security

LUCY Security

LUCY is the answer when you want to increase your IT security, maintain your cyber security awareness, or test your IT defenses.

PixelPlex

PixelPlex

PixelPlex is a blockchain and custom software development company with offices and developers in New York, Geneva, and Seoul.

Authomize

Authomize

Authomize aggregates identities and authorization mechanisms from any applications around your hybrid environment into one unified platform so you can easily and rapidly manage and secure all users.

Softcat

Softcat

Softcat offer a broad portfolio of IT services and solutions covering Hybrid Infrastructure, Cyber Security, Digital Workspace and IT Intelligence.

Communicate Technology

Communicate Technology

Communicate Technology are IT, telecoms and cyber-security specialists, keeping over 500 businesses and 50,000 users connected and secure across the UK.

Delinea

Delinea

Delinea is a leading provider of cloud-ready privileged access management (PAM) solutions that empower cybersecurity for the modern, hybrid enterprise.

Limes Security

Limes Security

Limes Security GmbH is the leading OT Security expert in the German-speaking region of Europe.