US vs. North Korea Cyberwar Underway

Dr Andrew Futter from the University of Leicester School of History, Politics and International Relations claims that a cyber war between the United States and North Korea is already taking place and has possible ramifications for critical infrastructure.

In an article for Think: Leicester, a platform for academic thought leadership and informed opinion pieces at the University of Leicester, Dr Futter writes: "Tensions between the US and North Korea have continued to mount in recent weeks, and evidence has emerged that the Trump Administration may be seeking to neuter the growing North Korean nuclear and missile aspirations through the use of cyber-attacks.  

"Whether US cyber-warriors based in undisclosed locations, likely just outside the Washington beltway, are responsible for recent North Korean missile failures and other suspected problems, it seems highly likely that an innovative and highly secretive cyber war is underway.”

Dr Futter says that critical infrastructure will be one of the targets of the cyber war and warns that using cyber-attacks as a weapon of war could have damaging ramifications for organizations in the future.

"The establishment of a norm that the use of cyber-attacks against critical infrastructure and weapons is unlikely to benefit anyone in the long run," says Dr Futter.

"With US infrastructure so depended upon hi-tech computer systems and networks, not to mention current plans to modernise and digitise the systems that control and manage US nuclear weapons, the current approach to North Korea may leave us all more vulnerable and less secure in the long run."

Ein News:

You Might Also Read: 

Cyber Warfare - Alleged Failures Of North Korean Missile Launches:

North Korea More Likely To Launch A Cyber Attack Than A Military Strike:

A Geneva Convention For Cyber War:

Cyber Attacks Against Korean Missile Launches:

 

« Cyber Should Be Standalone Insurance
Hacker Holds Netflix To Ransom »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

EC-Council

EC-Council

EC-Council is a member-based organization that certifies individuals in various e-business and information security skills.

FAMOC

FAMOC

FAMOC is an enterprise mobile management solution that delivers comprehensive security and management for applications, documents, email, and mobile devices.

Cambridge Intelligence

Cambridge Intelligence

Cambridge Intelligence are experts in network visualization and finding hidden trends in complex connected data. Applications include cybersecurity.

Cimcor

Cimcor

Cimcor’s flagship software product, CimTrak, helps organizations to monitor and protect a wide range of physical, network and virtual IT assets in real-time.

California Cybersecurity Institute (CCI) - Cal poly

California Cybersecurity Institute (CCI) - Cal poly

The CCI provides a hands-on research and learning environment to explore new cyber technologies and train and test tactics alongside law enforcement and cyberforensics experts.

CyberForce Competition

CyberForce Competition

The CyberForce Competition is a US Department of Energy cyber defense competition that focuses on the defensive/hardening aspects of energy cyber infrastructure.

eResilience

eResilience

eResilience is a division of Referentia Systems, a pioneer in an ultra-secure information safeguarding technique known as “Enclaving”, in which data can be segmented and protected within a network.

Fingent

Fingent

Fingent develops strategic software solutions for businesses across the globe in areas including Network Security, Infrastructure Security, Application Security, Risk and Compliance.

Griffiss Institute (GI)

Griffiss Institute (GI)

GI's primary role is to advocate and facilitate the co-operation of private industry, academia, and the Air Force Research Laboratory in developing solutions to critical cyber security problems.

Qasky

Qasky

Anhui Qasky Quantum Technology Co. Ltd. (Qasky) is a new high-tech enterprise engaged in quantum information technology industrialization in China.

AirITSystems

AirITSystems

AirITSystems offer companies comprehensive IT security solutions that take all security considerations into account and are tailored to your business.

Think|Stack

Think|Stack

Think|Stack is a managed IT services company specializing in cloud and cybersecurity with human-centered design.

Third Point Ventures

Third Point Ventures

Third Point brings deep technical expertise, a strong network of relationships, and decades of investing experience to add value to our partners throughout their journey from idea to IPO and beyond.

iomart Group

iomart Group

iomart is a cloud computing and IT managed services business providing secure hybrid cloud, network connectivity, data management, and digital workplace capability.

Iron Mountain

Iron Mountain

Iron Mountain Incorporated is a global business dedicated to storing, protecting and managing, information and assets.

Badge

Badge

Badge authenticates you on-demand for every application, on any device, without storing any secrets.