The Next 9/11 Will Be A Cyber Attack

The FBI has compared recent cyber attacks on US government and corporate entities to the same level of threat presented by the 9/11 terrorist attack. 

US Admiral James Stavridis,  ex- NATO Supreme Allied Commander for Europe, has echoed this perspective in a recent TV interview. “We’re headed toward a cyber Pearl Harbor, and it is going to come at either the grid or the financial sector... we need to think about this cyber attack as a pandemic.”

Now, as tension in Ukraine grows, some security experts are saying that a cyber attack of devastating proportions is only a matter of time.

The rapid transformation from office-based activity to remote work prompted by the Coronavirus pandemic has demanded the adoption of robust cyber security protocols to mitigate the risk many organisations face from  malware and ransomware.

Pressure Points On Critical Infrastructure 

The World Economic Forum’s Global Risk Report ranks cyber security failure among the greatest threats facing humanity within the next decade, saying “…attackers could trigger a breakdown in the systems that keep societies functioning.” Industry and critical infrastructure which need to be running continuously - such as nuclear power plants, banking operations, intensive care units in hospitals and Coronavirus vaccine distribution - could be potential targets for hackers, whether they are small groups or state actors. 

Concerns exist that nation-state actors will test the pressure points of critical infrastructure through hacks with the aim of sowing seeds of more chaos by disrupting the supply chains during future periods of geo-political conflict. At such times, targeting food and energy supplies of an adversary will be a classic strategy to begin with. 

Escalating Concerns

The hacking of the Colonial Pipeline controlling  45 percent of fuel in the Eastern US, led to panic buying of petrol by consumers which in turn escalated fuel prices on the entire Eastern coast.  Around the world, recent cyber attacks on critical infrastructure in Australia and Israel the vulnerabiltiy of some of the computer operated distribution networks upon which nations rely.  

These are various  scenarios that concern independent cyber security experts and they have three common characteristics: 

  • Physical attacks that shut off or damage some aspect of critical services.
  • Financial attacks that spin out of control and lead to bank runs. 
  • Disinformation via manipulating data and information in a way that undermines trust in critical national institutions.

Today, its not hard to imagine a scenario  in which a cyber attack could shut down basic services such as electricity or water supply, which can and will adversely affect millions of people. 

The Challenge Facing Policymakers

Political leaders all over the world are waking up to the serious threats posed by cyber warfare. Huawei's 5G technology is an example where companies all over the globe, policy makers and governments, especially of Denmark, India, Japan, and South Africa have raised issues about the geopolitical neutrality and the subsequent threat to sovereignty from private corporations involved within the cyber realm. 

Some countries have issued a complete ban on Huawei 5G communications equipment, although the Chinese the company continues to gains more ground by virtue of low pricing for its innovative technology 

Technology innovation is not likely to slow and indeed digital advances are likely to accelerate. Super-computing and quantum computing will push change ahead and enable even more powerful digital applications. Only by focusing on controlling technological advances will vulnerable nations be able to address the  problems of misinformation, personal privacy, cyber security and disinformation. 

WEF:     Brookings:      Economic Times:    Guardian:       CNBC:      Biometrica

You Might Also Read: 

Cyber Warfare Is The New Frontier:

 

 

« Is Cyber Training Fit For Purpose?
NATO & Ukraine Agree Deeper Cyber Co-operation »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Pole SCS (Secure Communicating Solutions)

Pole SCS (Secure Communicating Solutions)

SCS is a world-class competitiveness cluster dedicated to digital technologies in the fields of Microelectronics, Internet Of Things, Digital Security, Artificial Intelligence And Big Data.

Auth0

Auth0

Auth0 is a cloud service that provides a set of unified APIs and tools that instantly enables single sign-on and user management for any application, API or IoT device.

Malware Patrol

Malware Patrol

Malware Patrol provides intelligent threat data that protects against cyber attacks.

Silverfort

Silverfort

Silverfort introduces the first security platform enabling adaptive authentication and identity theft prevention for sensitive user, device and resource throughout the entire organization.

360 Total Security

360 Total Security

360 company is the largest provider of Internet and mobile security products in China.

Outsource UK

Outsource UK

Outsource UK is an independent recruitment company supplying highly-skilled technology, change and engineering talent to clients within a range of specialist sectors including Cyber Security.

About Cyber Security.

About Cyber Security.

About Cybersecurity provides a galaxy-wide knowledge base of cybersecurity tactics and techniques derived from actual experience.

Syber Technology

Syber Technology

Syber Technology is an IT project implementer empowering IT systems of Small to Medium Enterprises in the Middle East.

Visible Statement

Visible Statement

Visible Statement is a computer-based delivery system designed to insure the retention and recall of your most important security training messages.

CRI Group

CRI Group

CRI Group excels at deterring, detecting and investigating crimes against businesses using a global network of professionals specially trained in Anti-Corruption, Risk Management and Compliance.

Saiflow

Saiflow

SaiFlow provides a tailor-made cybersecurity solution for Electric Vehicles Charging Infrastructure (EVCI), Distributed Energy Resources (DERs) and energy networks and assets.

DarkFeed

DarkFeed

DarkFeed is a Threat Intelligence provider that monitors the darknet in real-time, where hackers and Cyber criminals are most active.

Total Secure Technology

Total Secure Technology

Total Secure Technology provides trusted Managed IT Security and Managed IT Services for organizations looking to increase their cybersecurity defensive posture.

ExactTrak

ExactTrak

ExactTrak provide embedded cyber security solutions for your digital devices – whenever and wherever you need them.

SecuLore

SecuLore

An innovator in public-safety-focused cybersecurity, SecuLore is dedicated to protecting critical infrastructure from cyber attacks.

Luxembourg House of Cybersecurity (LHC)

Luxembourg House of Cybersecurity (LHC)

Luxembourg House of Cybersecurity (formerly SecurityMadeIn.lu) is the backbone of leading-edge cyber resilience in Luxembourg.