Hacking is the new threat in the military and civil world. We can say that the new threat is cyber warfare. And if we are not prepared, that thing can cause many problems. Cyber warfare itself is not a new phenomenon. The idea in that kind of warfare is that the enemy’s computers are infected with computer viruses. Or things. Like homepages that the opposite side uses for sharing information can be loaded with disinformation.
Cyber intelligence can search for information from enemy equipment, tactics, or key personnel's positions, so that they can be targeted for special forces attacks. Hackers can also search for the positions of important installations.
Things like energy supply systems are targets for cyber attacks. The modern military uses more and more electricity. The effective combat control systems, like radars and communication platforms, require electricity. But things like new tools, such as laser weapons and drones, also require electricity. The entire system must be protected against cyberattacks. There is a possibility that a hacker who has access to the wrong databases can simply remove those people's access to some systems. Or they can remove the data of the entire military crew. Or in some scenarios, hackers can simply report the key people, like nuclear weapon operators, as dead in an accident, into the system.
What if the system will not allow them access to the command center?
One example of a destructive cyber attack is an attack that activates power plants' emergency shutdowns. That system can close the energy production in those systems immediately. Basically, hackers can break down things like electric networks by shutting down the main energy production units, like nuclear power plants. That thing activates auxiliary power immediately. When auxiliary power is on, the main energy production units will be activated again.
Suppose the electric network is not protected against such a situation that causes an overload. So, that is the reason why the electricity must never be loaded onto the electric network from the generator. The other thing is that the electric networks must be based on many small platforms rather than one big central platform. If one of those systems is shut down, the effect on the entire network is smaller. Basically, in the case of a nuclear reactor, only anonymous phone calls to the control room can cause an emergency shutdown. The hacker can say that there is a logic bomb, which means a computer virus that destroys the control program immediately. So, would the reactor crew start to test if those computer viruses are really in the system?
We have firewalls and antivirus programs. The fact is, if we want to put the computer viruses into the systems, what is needed is a reprogrammed RFID chip or some access card whose microchip is reprogrammed. That thing can transmit a small code that can open the gate to the system. In that case, the small virus will not break the system. It just opens the path to a targeted system. And in some scenarios, the hacker could use the faked VPN connection for that operation if a hacker can somehow fake the computer’s identity to match the computer that has access to the target computer and use a trusted VPN that can allow it to inject malicious code into the system.
In hacking and computer crimes, productive thinking is the key element. If the hacker can hijack some screens, they can send fake malfunction reports. If the error level of a computer rises and the system reports a damaged hard disk, the system requires service. The attacker can simply try to put an infected hard disk in the computer center. That is one of the threats in computing. If hackers can make their own computer that has access to a targeted system, it can open the road to all data that travels through it.
The AI-based firewalls can protect military systems against traditional computer viruses and hackers. But the new threat is nanotechnology. The nanotechnical systems can slip into the computer rooms. They can search the microchips, and then those nanorobots can transmit data that travels through the processors to the controllers. Nanorobots can transmit data to the computers through those microcircuits. Or they can cut microchips off the microcircuits. And then start to transmit their own code to the system. The new tools require new resistance. The nanorobot, or maybe a matchbox-size drone, can travel to the cable connection and detonate itself. That thing can damage the power supply to the computer, or it can cut data communication outside the computer. The drone acts like an anti-radiation missile that can search the WLAN stations and detonate them.
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.