Mette Eilstrup-Sangiovanni defines cyber warfare as "the deliberate and hostile use by a state of a cyber weapon with the intention of causing injury or death to persons and/or to significantly disrupt, damage, or destroy another state's strategic assets or critical national infrastructure” (Eilstrup-Sangiovanni, 2018)What would cyber warfare look like? and experiments, such as Stuxnet, The Aurora Generator Test, the failed Iranian attack on the Bowman Avenue Dam in New York, and the Russian cyber attacks on the Ukrainian power grid. I will try to predict the future possibility of cyber attacks and what a cyber war might look like , including the effects of the growing Internet of Things and the possible effects of digital twins I will start with what is probably the most famous cyber attack, Stuxnet. The Stuxnet Worm was the first ever “cyber warfare weapon” used to sabotage an Iranian nuclear site. (Langner, 2011). Stuxnet entered the system via an infected USB key. The worm presented itself with a trusted digital certificate to fool any Windows operating system it found. The worm then searched the local network for any Siemens programmable logic controllers (PLCs), as its code was specific to Siemens. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an original essay An example of the infected Siemens controller An example of the controlled centrifugesThe code initially monitored only the Siemens controllers, without causing damage to the machines However, after a complex system of timers and messages, the worm sent messages to all output devices on the network telling them that everything was working normally, and simultaneously spinning the centrifuges at incredible speed until they broke. (A centrifuge is a cylinder that usually contains a gas, which spins quickly, in this case it is used to enrich uranium). This cost Iran a lot of money and slowed its nuclear efforts. Stuxnet is a prominent example, as the code was too complex and specific for a small group of hackers. Most likely it was a coordinated attack by at least one country to sabotage another. Stuxnet was “reportedly developed and launched by the United States and Israel” (New Jersey Cybersecurity and Communications Integration Cell, 2017). The attack was also different as it was a military action. “Stuxnet's goal was to physically destroy a military target, not just metaphorically, but literally. ” (Langner, 2011). This attack was not intended to obtain information or extort money, but a cross-country precision attack. Cyber attacks usually occur on SCADA (supervisory control and data acquisition) systems A PLC is an example of a Scada system. SCADA is used in a wide range of industries, and with the growing Internet of Things, its use will become increasingly widespread, although the United States is one of the leaders in cyber warfare , they are also one of the most vulnerable countries to cyber attacks due to their use of the Internet of Things Amy Zegart states in her technological speech on cyber warfare “The United States is the most vulnerable because, because we are the most connected, we rely. about networks and connectivity for our economy for our civil society for our government for our military" (Zegart, 2017) . In the future it is possible that most machinery and vehicles will be automated or operated remotely. The.
tags