Now Tec BlogNow Tec Blog

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Securing public trust in science while countering threats to planet and humanity is top priority – Irish Times

    June 8, 2023

    The strange reality of internet connectivity in North Korea

    June 8, 2023

    How much plastic is in our oceans? | Environmental News

    June 8, 2023
    Facebook Twitter Instagram
    • Home
    • Business

      Outdoor events canceled due to New York smoke

      June 7, 2023

      GameStop fires CEO, shares drop 20%

      June 7, 2023

      Taylor Swift’s Eras Tour Benefits Local Economy

      June 7, 2023

      With Chris Licht leaving CNN, all of America’s major news outlets are headed by women

      June 7, 2023

      Saudi Arabia’s football push could burst MLS bubble

      June 7, 2023
    • Gadgets

      Reddit says some accessibility apps will no longer have to pay for APIs

      June 7, 2023

      Amazon is reportedly planning ad slots for Prime Video

      June 7, 2023

      Paradox Interactive refunds physical pre-orders for ‘Vampire: The Masquerade – Bloodlines 2’

      June 7, 2023

      New York City sues Hyundai for negligence after TikTok car theft

      June 7, 2023

      The best smart light bulbs for 2023

      June 7, 2023
    • Tech

      The strange reality of internet connectivity in North Korea

      June 8, 2023

      Fire Age Comes to America’s East Coast

      June 8, 2023

      The success of Diablo IV is a welcome distraction for Activision Blizzard

      June 7, 2023

      Deepmind’s AI is learning the art of coding

      June 7, 2023

      Google DeepMind Gameplay AI Discovers Another Way To Speed ​​Up Your Code

      June 7, 2023
    • World

      How much plastic is in our oceans? | Environmental News

      June 8, 2023

      China’s backlash against ‘The Little Mermaid’ exposes Hollywood’s ties | Entertainment

      June 8, 2023

      Trump’s target for classified documents investigation, prosecutors tell lawyers | Donald Trump News

      June 8, 2023

      West Ham beat Fiorentina 2-1 in European Conference final | Football News

      June 8, 2023

      U.S. School Shooting Omission Defendant Co-Defendant Trial Begins | Gun Violence News

      June 8, 2023
    • AI

      Details of DGA deal on AI, leftovers revealed – The Hollywood Reporter

      June 8, 2023

      Myst Creator’s Latest Game Uses ‘AI-Assisted Content’, Funders Furious

      June 8, 2023

      Bill Gates believes the next big thing in AI will come from an obscure startup

      June 7, 2023

      Lawmakers Focus on AI, Insulin Costs and Pandemic Preparedness in DC Policy Debate

      June 7, 2023

      UK hosts major AI summit of ‘like-minded’ nations – POLITICO

      June 7, 2023
    • Apple

      Fans were stunned when they spotted Arctic Monkey drinking from a spoon

      June 7, 2023

      Apple finally reveals it plans to stop automatic correction to ‘duck’

      June 7, 2023

      macOS Sonoma Skips These MacBooks and Macs: Check Compatibility Now

      June 7, 2023

      NEXT LEVEL SPATIAL COMPUTING

      June 6, 2023

      P!NK Celebrate Daughter’s Birthday With ‘Miss Manchester’

      June 6, 2023
    • ChatGPT

      Boy uses ChatGPT for homework.this is what let him go

      June 8, 2023

      AI and humans collaborate on first ChatGPT designed robot

      June 8, 2023

      Understanding the Potential Role of ChatGPT in Healthcare – RACmonitor

      June 7, 2023

      How AI bots like ChatGPT can help victims and prevent suicide | Nationwide

      June 7, 2023

      Mark Walters sues ChatGPT for embezzlement ‘hallucinations’

      June 7, 2023
    • Cyber Security

      Op-Ed: Reducing Ransomware Recovery Time and Complexity

      June 8, 2023

      Key Factors Driving Enterprise Demand for New Cybersecurity Technologies

      June 8, 2023

      Delinea wins award for cybersecurity mitigation solution

      June 8, 2023

      ACT Government Suffers Cybersecurity Breach

      June 8, 2023

      Remote Access Cybersecurity: New CISA Best Practices

      June 7, 2023
    • Computing

      How in-memory computing is driving innovation in the telecommunications industry

      June 8, 2023

      Security Challenges and Solutions in Fog Computing

      June 8, 2023

      Growing Importance of Fog Computing in Medicine

      June 8, 2023

      A powerful combination for data security

      June 8, 2023

      Zettascale Computing Deep Dive: Architecture, Technology, Trends

      June 8, 2023
    • Science

      Securing public trust in science while countering threats to planet and humanity is top priority – Irish Times

      June 8, 2023

      A program that offers free marine science experiences

      June 8, 2023

      Alaskan rocks photographed over 33 years

      June 8, 2023

      Top Charity Seniors Driven by Love for Science | Richmond & Hopkinton

      June 8, 2023

      Super high school student graduates from North Carolina School of Science and Mathematics

      June 8, 2023
    Facebook Twitter Instagram
    Now Tec BlogNow Tec Blog
    • Home
    • Business

      Outdoor events canceled due to New York smoke

      June 7, 2023

      GameStop fires CEO, shares drop 20%

      June 7, 2023

      Taylor Swift’s Eras Tour Benefits Local Economy

      June 7, 2023

      With Chris Licht leaving CNN, all of America’s major news outlets are headed by women

      June 7, 2023

      Saudi Arabia’s football push could burst MLS bubble

      June 7, 2023
    • Gadgets

      Reddit says some accessibility apps will no longer have to pay for APIs

      June 7, 2023

      Amazon is reportedly planning ad slots for Prime Video

      June 7, 2023

      Paradox Interactive refunds physical pre-orders for ‘Vampire: The Masquerade – Bloodlines 2’

      June 7, 2023

      New York City sues Hyundai for negligence after TikTok car theft

      June 7, 2023

      The best smart light bulbs for 2023

      June 7, 2023
    • Tech

      The strange reality of internet connectivity in North Korea

      June 8, 2023

      Fire Age Comes to America’s East Coast

      June 8, 2023

      The success of Diablo IV is a welcome distraction for Activision Blizzard

      June 7, 2023

      Deepmind’s AI is learning the art of coding

      June 7, 2023

      Google DeepMind Gameplay AI Discovers Another Way To Speed ​​Up Your Code

      June 7, 2023
    • World

      How much plastic is in our oceans? | Environmental News

      June 8, 2023

      China’s backlash against ‘The Little Mermaid’ exposes Hollywood’s ties | Entertainment

      June 8, 2023

      Trump’s target for classified documents investigation, prosecutors tell lawyers | Donald Trump News

      June 8, 2023

      West Ham beat Fiorentina 2-1 in European Conference final | Football News

      June 8, 2023

      U.S. School Shooting Omission Defendant Co-Defendant Trial Begins | Gun Violence News

      June 8, 2023
    • AI

      Details of DGA deal on AI, leftovers revealed – The Hollywood Reporter

      June 8, 2023

      Myst Creator’s Latest Game Uses ‘AI-Assisted Content’, Funders Furious

      June 8, 2023

      Bill Gates believes the next big thing in AI will come from an obscure startup

      June 7, 2023

      Lawmakers Focus on AI, Insulin Costs and Pandemic Preparedness in DC Policy Debate

      June 7, 2023

      UK hosts major AI summit of ‘like-minded’ nations – POLITICO

      June 7, 2023
    • Apple

      Fans were stunned when they spotted Arctic Monkey drinking from a spoon

      June 7, 2023

      Apple finally reveals it plans to stop automatic correction to ‘duck’

      June 7, 2023

      macOS Sonoma Skips These MacBooks and Macs: Check Compatibility Now

      June 7, 2023

      NEXT LEVEL SPATIAL COMPUTING

      June 6, 2023

      P!NK Celebrate Daughter’s Birthday With ‘Miss Manchester’

      June 6, 2023
    • ChatGPT

      Boy uses ChatGPT for homework.this is what let him go

      June 8, 2023

      AI and humans collaborate on first ChatGPT designed robot

      June 8, 2023

      Understanding the Potential Role of ChatGPT in Healthcare – RACmonitor

      June 7, 2023

      How AI bots like ChatGPT can help victims and prevent suicide | Nationwide

      June 7, 2023

      Mark Walters sues ChatGPT for embezzlement ‘hallucinations’

      June 7, 2023
    • Cyber Security

      Op-Ed: Reducing Ransomware Recovery Time and Complexity

      June 8, 2023

      Key Factors Driving Enterprise Demand for New Cybersecurity Technologies

      June 8, 2023

      Delinea wins award for cybersecurity mitigation solution

      June 8, 2023

      ACT Government Suffers Cybersecurity Breach

      June 8, 2023

      Remote Access Cybersecurity: New CISA Best Practices

      June 7, 2023
    • Computing

      How in-memory computing is driving innovation in the telecommunications industry

      June 8, 2023

      Security Challenges and Solutions in Fog Computing

      June 8, 2023

      Growing Importance of Fog Computing in Medicine

      June 8, 2023

      A powerful combination for data security

      June 8, 2023

      Zettascale Computing Deep Dive: Architecture, Technology, Trends

      June 8, 2023
    • Science

      Securing public trust in science while countering threats to planet and humanity is top priority – Irish Times

      June 8, 2023

      A program that offers free marine science experiences

      June 8, 2023

      Alaskan rocks photographed over 33 years

      June 8, 2023

      Top Charity Seniors Driven by Love for Science | Richmond & Hopkinton

      June 8, 2023

      Super high school student graduates from North Carolina School of Science and Mathematics

      June 8, 2023
    Now Tec BlogNow Tec Blog
    Home»Tech News»The terrible possibility of cyber attacks on weapon systems
    Tech News

    The terrible possibility of cyber attacks on weapon systems

    eduardo_alves38By eduardo_alves38March 10, 2021Updated:March 10, 2021No Comments4 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    We often hear on cyber attacks, cyber operations and malware infections that target computer systems or smartphones. Attacks on civilian infrastructure such as hospitals, water sanitation systems and the energy sector also get a lot of airtime. But there is another type of high-stakes system that receives a lot less attention: weapon systems. These include guided missiles, missiles and anti-missile systems, tanks, combat aircraft, etc., all of which are computerized and possibly networked. One can imagine that weapon systems contain security vulnerabilities similar to most other information systems, including the most serious.

    A malicious adversary taking control of lethal weapons capable of kinetic destruction can look like a plot of political fiction that begs to be overrated. But today, computerized weapon systems control the pillars of defense in many countries. And while the information on these systems is very secret, there is one thing we do know: Although access to such systems is not easy, they almost certainly contain vulnerabilities. My experience indicates that there is no reason to think otherwise. And such a possibility constitutes a potential risk to the security and stability of the world.

    The consequences of such hacking operations could be disastrous. Control of these weapon systems is an integral prerogative of the state, and any external interference with them could be interpreted as interference in the internal affairs of the state, leading to retaliation. No country would simply allow its adversaries to glance at issues restricted to state control, such as military oversight. Fortunately, achieving this is far from straightforward.

    Carrying out such a cyberattack would require not only hostile intentions, but also the existence of security vulnerabilities in control systems. In order to exploit such bugs, the attacker would also need to access this system, which is not easy to obtain. But these obstacles are not impenetrable.

    Hopefully these cyber risks remain low. In order to ensure that they do this, the number and severity of these vulnerabilities must be monitored. Military and governments around the world must create a management process for discovering vulnerabilities – a process that encourages finding them, establishes a system to fix them, maybe even shares information with allies, and generally works on it. stability. Likewise, the opportunity to exploit weaknesses should be closely monitored, usually by allowing access only from internal networks, which malicious actors could not reach.

    Hopefully the armies of the world are already, in fact, looking for these vulnerabilities. But while they have found them in the past, information about these finds has rarely been disclosed to the public. This sphere is imbued with silence. Public treats come from the rare reports or occasions of remarkable transparency. These reports are a litmus test, confirming suspicions of vulnerable weapon systems. For example, the United States of 2018 Government Accountability Office Report includes a note on routinely identifying “mission critical cyber vulnerabilities that adversaries could compromise”, including the ability to take full control of systems under test, in some cases. He goes on to explain that these vulnerabilities pose unique threats to large, interdependent systems, also because updating or replacing a single part is far from straightforward. According to the report, “a patch or software enhancement that causes problems in an email system is impractical, while a patch that affects an aircraft or missile system could be catastrophic.”

    Fortunately, awareness of this problem seems to exist in some communities. In a declassified 2021 briefing, the US Department of Defense revealed that cybersecurity risks had been identified in several systems, including a missile warning system, a tactical radio system, a guided missile and the B-2 Spirit bomber. While the details of the cybersecurity issues identified and resolved remain confidential, we can reasonably conclude that these and other weapon systems have serious weaknesses.

    Similar concerns are raised by the (classified) results of the audit of a 16-year-old B-2 Spirit bomber capable of carrying nuclear munitions. The technical details of the report are not publicly available, but what we can see allows us to reasonably conclude that serious cybersecurity vulnerabilities exist in weapon systems, including those that would allow the potential adversary to take control. control of a system. This is likely due to the fact that maintaining these old legacy systems is still a cybersecurity challenge, whether they are outdated systems used in hospitals or weapon systems used by armies around the world. Fortunately, when updating them, some issues are detected and fixed. But the phenomenon of cybersecurity risks in existing weapon systems is real. And this is true not only of the weapon systems employed by the United States, but probably also of virtually every other weapon system employed by any other country.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    eduardo_alves38
    • Website

    Related Posts

    The strange reality of internet connectivity in North Korea

    June 8, 2023

    Fire Age Comes to America’s East Coast

    June 8, 2023

    The success of Diablo IV is a welcome distraction for Activision Blizzard

    June 7, 2023
    Add A Comment

    Leave A Reply Cancel Reply

    Editors Picks

    Boy uses ChatGPT for homework.this is what let him go

    June 8, 2023

    AI and humans collaborate on first ChatGPT designed robot

    June 8, 2023

    Understanding the Potential Role of ChatGPT in Healthcare – RACmonitor

    June 7, 2023

    How AI bots like ChatGPT can help victims and prevent suicide | Nationwide

    June 7, 2023
    Top Reviews
    Advertisement
    Demo
    Now Tec Blog
    Facebook Twitter Instagram Pinterest Vimeo YouTube
    • Home
    • About us
    • DMCA
    • Privacy Policy
    © 2023 nowtecblog. Designed by nowtecblog.

    Type above and press Enter to search. Press Esc to cancel.