US vs. North Korea Cyberwar Underway

Dr Andrew Futter from the University of Leicester School of History, Politics and International Relations claims that a cyber war between the United States and North Korea is already taking place and has possible ramifications for critical infrastructure.

In an article for Think: Leicester, a platform for academic thought leadership and informed opinion pieces at the University of Leicester, Dr Futter writes: "Tensions between the US and North Korea have continued to mount in recent weeks, and evidence has emerged that the Trump Administration may be seeking to neuter the growing North Korean nuclear and missile aspirations through the use of cyber-attacks.  

"Whether US cyber-warriors based in undisclosed locations, likely just outside the Washington beltway, are responsible for recent North Korean missile failures and other suspected problems, it seems highly likely that an innovative and highly secretive cyber war is underway.”

Dr Futter says that critical infrastructure will be one of the targets of the cyber war and warns that using cyber-attacks as a weapon of war could have damaging ramifications for organizations in the future.

"The establishment of a norm that the use of cyber-attacks against critical infrastructure and weapons is unlikely to benefit anyone in the long run," says Dr Futter.

"With US infrastructure so depended upon hi-tech computer systems and networks, not to mention current plans to modernise and digitise the systems that control and manage US nuclear weapons, the current approach to North Korea may leave us all more vulnerable and less secure in the long run."

Ein News:

You Might Also Read: 

Cyber Warfare - Alleged Failures Of North Korean Missile Launches:

North Korea More Likely To Launch A Cyber Attack Than A Military Strike:

A Geneva Convention For Cyber War:

Cyber Attacks Against Korean Missile Launches:

 

« Cyber Should Be Standalone Insurance
Hacker Holds Netflix To Ransom »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CloudEndure

CloudEndure

CloudEndure offers Disaster Recovery and Continuous Replication for the Cloud.

Censornet

Censornet

Censornet's autonomous, integrated cloud security gives mid-market organisations the confidence and control of enterprise-grade cyber protection.

National Defence Radio Establishment (FRA) - Sweden

National Defence Radio Establishment (FRA) - Sweden

The National Defence Radio Establishment (Försvarets Radioanstalt), is the Swedish national authority for Signals Intelligence, also providing Information assurance services to government authorities.

ATSEC Information Security

ATSEC Information Security

ATSEC is an independent, privately-owned company that focuses on providing laboratory and consulting services for information security.

Idemia

Idemia

Idemia is a global leader in security and identity solutions.

Positive Technologies

Positive Technologies

Positive Technologies is a leading global provider of enterprise security solutions for vulnerability and compliance management, incident and threat analysis, and application protection.

SolutionsPT

SolutionsPT

SolutionsPT enables customers to strengthen their Operational Technology (OT) network to meet the ever increasing demand for performance, availability, connectivity and security.

SteelCloud

SteelCloud

SteelCloud has spent the last decade inventing technology to automate policy compliance, configuration control, and Cloud security.

CERT Tonga

CERT Tonga

CERT Tonga is the national Computer Emergency Response Team for Tonga.

Styra

Styra

Styra allows companies to secure cloud environments and applications, including those built on the popular Kubernetes open-source cloud platform.

Perch Security

Perch Security

Perch is a co-managed threat detection and response platform backed by an in-house Security Operations Center (SOC).

Pelta Cyber Security

Pelta Cyber Security

Pelta Cyber Security is the cyber security consulting and solutions division of Softworld Inc. We provide staffing and recruitment services as well as consulting and solutions for outsourced projects.

NetApp

NetApp

The NetApp portfolio includes intelligent cloud services, data services, and storage infrastructure that helps organizations manage applications and data everywhere across hybrid cloud environments.

Prembly

Prembly

Prembly are a compliance and security infrastructure company.

Professional Labs

Professional Labs

Professional Labs specialize in simplifying complex problems for our customers with Cloud Services, Managed Services and Cyber Security.

Tracer

Tracer

Tracer (formerly Appdetex) is a next-generation brand protection solution. It constantly finds, analyzes, and stops brand abuse across Web2 and Web3 digital channels.