US vs. North Korea Cyberwar Underway

Dr Andrew Futter from the University of Leicester School of History, Politics and International Relations claims that a cyber war between the United States and North Korea is already taking place and has possible ramifications for critical infrastructure.

In an article for Think: Leicester, a platform for academic thought leadership and informed opinion pieces at the University of Leicester, Dr Futter writes: "Tensions between the US and North Korea have continued to mount in recent weeks, and evidence has emerged that the Trump Administration may be seeking to neuter the growing North Korean nuclear and missile aspirations through the use of cyber-attacks.  

"Whether US cyber-warriors based in undisclosed locations, likely just outside the Washington beltway, are responsible for recent North Korean missile failures and other suspected problems, it seems highly likely that an innovative and highly secretive cyber war is underway.”

Dr Futter says that critical infrastructure will be one of the targets of the cyber war and warns that using cyber-attacks as a weapon of war could have damaging ramifications for organizations in the future.

"The establishment of a norm that the use of cyber-attacks against critical infrastructure and weapons is unlikely to benefit anyone in the long run," says Dr Futter.

"With US infrastructure so depended upon hi-tech computer systems and networks, not to mention current plans to modernise and digitise the systems that control and manage US nuclear weapons, the current approach to North Korea may leave us all more vulnerable and less secure in the long run."

Ein News:

You Might Also Read: 

Cyber Warfare - Alleged Failures Of North Korean Missile Launches:

North Korea More Likely To Launch A Cyber Attack Than A Military Strike:

A Geneva Convention For Cyber War:

Cyber Attacks Against Korean Missile Launches:

 

« Cyber Should Be Standalone Insurance
Hacker Holds Netflix To Ransom »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Acumin Recruitment

Acumin Recruitment

Acumin is an internationally established Cyber Security recruitment specialist.

Senetas

Senetas

Senetas is a leading developer and manufacturer of certified high-assurance encryption solutions, dedicated to protecting network transmitted data without compromising performance.

Nakivo

Nakivo

NAKIVO is dedicated to delivering the ultimate backup, ransomware protection and disaster recovery solution for virtual, physical, cloud and SaaS environments.

TROOPERS

TROOPERS

TROOPERS InfoSec event consists of two days of high-end training, followed by a two-day, three-track conference, culminating in Roundtables on the final day.

CryptoCurrency Certification Consortium (C4)

CryptoCurrency Certification Consortium (C4)

The CryptoCurrency Certification Consortium is a non-profit organization that provides certifications to professionals who perform cryptocurrency-related services.

Korn Ferry

Korn Ferry

Korn Ferry is a global organizational consulting firm, synchronizing strategy and talent to drive superior performance for our clients in key areas including cybersecurity.

Qasky

Qasky

Anhui Qasky Quantum Technology Co. Ltd. (Qasky) is a new high-tech enterprise engaged in quantum information technology industrialization in China.

FraudLabs Pro

FraudLabs Pro

FraudLabs Pro detects fraud and helps merchants to reduce e-commerce chargebacks by identifying high risk transactions.

Information & Communications Technology Association of Jordan (int@j)

Information & Communications Technology Association of Jordan (int@j)

The Information & Communications Technology Association of Jordan is a membership based ICT and IT Enabled Services (ITES) industry advocacy, support and networking association.

ARIA Cybersecurity Solutions

ARIA Cybersecurity Solutions

The ARIA ADR Automatic Detection & Response solution was designed to find, verify, and stop all types of attacks - automatically and in real time.

Hex-Rays

Hex-Rays

Founded in 2005, privately held, Belgium based, Hex-Rays SA focuses on the development of fast, stable, and robust binary analysis tools for the IT security market.

3i Infotech

3i Infotech

3i Infotech offers consulting & professional services to assess, design and build next gen IT infrastructure, and managed services to operate, optimize and continuously improve.

Cyber Bytes Foundation

Cyber Bytes Foundation

Cyber Bytes Foundation exists to establish and sustain a unique Cyber Ecosystem to accelerate the development of a strong Cyber workforce and support community outreach programs.

Rimstorm

Rimstorm

Rimstorm’s mission is to significantly improve the security of your data using award-winning, state-of-the-art technology combined with cyber managed security services.

Intelligent CloudCare

Intelligent CloudCare

Intelligent CloudCare, a division of IPS, is a full IT Services provider serving the needs of SMBs in the metropolitan New York City region.

MajorKey Technologies

MajorKey Technologies

MajorKey improves security performance by reducing user friction and business risk, empowering your people, and protecting your IP.