The Next 9/11 Will Be A Cyber Attack

The FBI has compared recent cyber attacks on US government and corporate entities to the same level of threat presented by the 9/11 terrorist attack. 

US Admiral James Stavridis,  ex- NATO Supreme Allied Commander for Europe, has echoed this perspective in a recent TV interview. “We’re headed toward a cyber Pearl Harbor, and it is going to come at either the grid or the financial sector... we need to think about this cyber attack as a pandemic.”

Now, as tension in Ukraine grows, some security experts are saying that a cyber attack of devastating proportions is only a matter of time.

The rapid transformation from office-based activity to remote work prompted by the Coronavirus pandemic has demanded the adoption of robust cyber security protocols to mitigate the risk many organisations face from  malware and ransomware.

Pressure Points On Critical Infrastructure 

The World Economic Forum’s Global Risk Report ranks cyber security failure among the greatest threats facing humanity within the next decade, saying “…attackers could trigger a breakdown in the systems that keep societies functioning.” Industry and critical infrastructure which need to be running continuously - such as nuclear power plants, banking operations, intensive care units in hospitals and Coronavirus vaccine distribution - could be potential targets for hackers, whether they are small groups or state actors. 

Concerns exist that nation-state actors will test the pressure points of critical infrastructure through hacks with the aim of sowing seeds of more chaos by disrupting the supply chains during future periods of geo-political conflict. At such times, targeting food and energy supplies of an adversary will be a classic strategy to begin with. 

Escalating Concerns

The hacking of the Colonial Pipeline controlling  45 percent of fuel in the Eastern US, led to panic buying of petrol by consumers which in turn escalated fuel prices on the entire Eastern coast.  Around the world, recent cyber attacks on critical infrastructure in Australia and Israel the vulnerabiltiy of some of the computer operated distribution networks upon which nations rely.  

These are various  scenarios that concern independent cyber security experts and they have three common characteristics: 

  • Physical attacks that shut off or damage some aspect of critical services.
  • Financial attacks that spin out of control and lead to bank runs. 
  • Disinformation via manipulating data and information in a way that undermines trust in critical national institutions.

Today, its not hard to imagine a scenario  in which a cyber attack could shut down basic services such as electricity or water supply, which can and will adversely affect millions of people. 

The Challenge Facing Policymakers

Political leaders all over the world are waking up to the serious threats posed by cyber warfare. Huawei's 5G technology is an example where companies all over the globe, policy makers and governments, especially of Denmark, India, Japan, and South Africa have raised issues about the geopolitical neutrality and the subsequent threat to sovereignty from private corporations involved within the cyber realm. 

Some countries have issued a complete ban on Huawei 5G communications equipment, although the Chinese the company continues to gains more ground by virtue of low pricing for its innovative technology 

Technology innovation is not likely to slow and indeed digital advances are likely to accelerate. Super-computing and quantum computing will push change ahead and enable even more powerful digital applications. Only by focusing on controlling technological advances will vulnerable nations be able to address the  problems of misinformation, personal privacy, cyber security and disinformation. 

WEF:     Brookings:      Economic Times:    Guardian:       CNBC:      Biometrica

You Might Also Read: 

Cyber Warfare Is The New Frontier:

 

 

« Is Cyber Training Fit For Purpose?
NATO & Ukraine Agree Deeper Cyber Co-operation »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Tripwire

Tripwire

Tripwire are a leading provider of risk-based security, compliance and vulnerability management solutions.

Kirkland & Ellis

Kirkland & Ellis

Kirkland & Ellis LLP is an international law firm with offices in the USA, Europe and Asia. Practice areas include Data Security & Privacy.

Secure Identity Alliance (SIA)

Secure Identity Alliance (SIA)

The Secure Identity Alliance is dedicated to supporting sustainable worldwide economic growth and prosperity through the development of trusted digital identities and the adoption of secure eServices.

MetricStream

MetricStream

MetricStream provide integrated GRC solutions across business, IT, and security functions.

Ubisecure

Ubisecure

Ubisecure provide Identity & Access Management solutions.

Cradlepoint

Cradlepoint

With Cradlepoint customers leverage the speed and economics of wired and wireless Internet broadband for branch, mobile, and IoT networks while maintaining end-to-end visibility, security and control.

Cyfirma

Cyfirma

CYFIRMA offers Cyber threat visibility and intelligence suite and services aimed at keeping your organization’s cybersecurity posture up-to-date.

Cynamics

Cynamics

Cynamics is the only network monitoring solution built specifically for Smart City, Public Safety and Critical Infrastructure networks.

Internetwork Defense (IND)

Internetwork Defense (IND)

Internetwork Defense is a premier provider of Information Security Training and Business Consulting Services in the Mid-Atlantic region.

Comcast Business

Comcast Business

Comcast Business keeps businesses ready for what’s next with powerful connectivity, advanced cybersecurity solutions, and the right people at your side.

Celcom

Celcom

Celcom is the oldest mobile telecommunications provider in Malaysia, providing solutions and services to consumers and businesses.

Clarabot Nano

Clarabot Nano

Nano is the secure file sharing tool to improve content search, data access and collaboration between multiple parties.

CyberUp

CyberUp

CyberUp is a nonprofit organization created to strengthen the cybersecurity workforce. We help employers reimagine how they grow and scale their cybersecurity workforce.

Flawnter

Flawnter

Flawnter is a security testing software that finds hidden security and quality flaws in your applications.

Awareness Software Limited (ASL)

Awareness Software Limited (ASL)

As Hosting Specialists, Awareness Software offer practical and affordable hosting solutions including backup and disaster recovery and a range of cybersecurity services.

Trovent Security

Trovent Security

Trovent was founded with a clear goal: to support medium-sized companies in significantly increasing their IT security level.