US vs. North Korea Cyberwar Underway

Dr Andrew Futter from the University of Leicester School of History, Politics and International Relations claims that a cyber war between the United States and North Korea is already taking place and has possible ramifications for critical infrastructure.

In an article for Think: Leicester, a platform for academic thought leadership and informed opinion pieces at the University of Leicester, Dr Futter writes: "Tensions between the US and North Korea have continued to mount in recent weeks, and evidence has emerged that the Trump Administration may be seeking to neuter the growing North Korean nuclear and missile aspirations through the use of cyber-attacks.  

"Whether US cyber-warriors based in undisclosed locations, likely just outside the Washington beltway, are responsible for recent North Korean missile failures and other suspected problems, it seems highly likely that an innovative and highly secretive cyber war is underway.”

Dr Futter says that critical infrastructure will be one of the targets of the cyber war and warns that using cyber-attacks as a weapon of war could have damaging ramifications for organizations in the future.

"The establishment of a norm that the use of cyber-attacks against critical infrastructure and weapons is unlikely to benefit anyone in the long run," says Dr Futter.

"With US infrastructure so depended upon hi-tech computer systems and networks, not to mention current plans to modernise and digitise the systems that control and manage US nuclear weapons, the current approach to North Korea may leave us all more vulnerable and less secure in the long run."

Ein News:

You Might Also Read: 

Cyber Warfare - Alleged Failures Of North Korean Missile Launches:

North Korea More Likely To Launch A Cyber Attack Than A Military Strike:

A Geneva Convention For Cyber War:

Cyber Attacks Against Korean Missile Launches:

 

« Cyber Should Be Standalone Insurance
Hacker Holds Netflix To Ransom »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Asavie

Asavie

Asavie provide solutions for Enterprise Mobility Management and secure IoT Connectivity.

Immersive

Immersive

Immersive unifies Cyber Drills, Exercises, Sims, Ranges, and Training into one single, adaptive platform. One Platform. Total Cyber Resilience.

IUCC Cyber Unit - Israel

IUCC Cyber Unit - Israel

IUCC Cyber Unit safeguards Israel’s National Research & Education Network (NREN).

Sopher Networks

Sopher Networks

Sopher is a secure communication and collaboration platform for business and personal use.

MrLooquer

MrLooquer

MrLooquer provide a solution to automatically discover the assets of organizations on the internet, determine the level of exposure to attacks and help to manage risk accurately.

Novastor

Novastor

NovaStor® is an award-winning, international data backup and recovery software company with solutions supporting physical, virtual and cloud environments.

Ten Eleven Ventures

Ten Eleven Ventures

Ten Eleven is a specialized venture capital firm exclusively dedicated to helping cybersecurity companies thrive.

BLUECYFORCE

BLUECYFORCE

BLUECYFORCE is the leading professional training and cyber defense training organization in France.

Ensighten

Ensighten

Ensighten is a leader in Website Security & Privacy Compliance. Protect your website from malicious attacks, monitor & detect vulnerabilities, protect consumer data.

Strike Graph

Strike Graph

The Strike Graph GRC platform enables Security Audits & Certifications.

E2E Technologies

E2E Technologies

E2E Technologies are a proactive, SLA-beating, managed service provider that busts the common stereotypes surrounding IT.

Shorebreak Security

Shorebreak Security

Shorebreak Securioty specialize in conducting highly accurate, safe, and reliable Information Security tests to determine the risks posed to your business.

Grove Group

Grove Group

Grove provides businesses with the tools that work best for their unique operations, through cybersecurity and cloud services, custom software development and our big data analytics expertise.

Trojan Horse Security

Trojan Horse Security

Trojan Horse Security are specialists in corporate security. Our services include: Comprehensive Cyber Security Analysis, Penetration Testing, Network Security and Security Audits.

Trickest

Trickest

Trickest enables Enterprises, MSSPs, and Ethical Hackers to build automated offensive security workflows from prototype to production.

SecurWeave

SecurWeave

SecurWeave's Configurable Hardware Enforced Safety and Security (CHESS) platform has been designed to meet the security and safety criticality needs of the evolving digital industry.