Skip to main content

Cyber weapons are cheap and effective tool what almost anybody can get




Copyright for picture Saxonsgroup.com.au

Kimmo Huosionmaa

Cyber weapons are an effective tool if somebody wants to harm Internet-based networks. This kind of weapon is in the worst scenario so effective as so-called "blackout" bomb. Cyber weapons are actually computer viruses or other malware what will destroy computers operating systems and databases and if malware is so-called "logical bomb". This type of computer virus is made that it activates in one particular day when it can cause very bad damages for computer infrastructure.


Computer weapons are theoretically ineffective against military system what is prepared for an attack. But if an attacker finds system what is not immune to computer viruses he must cause very much trouble. In the worst scenario, the cyber attacker takes control in some nuclear plants computer. And in this scenario heart of reactor melts down and causes china syndrome, what could cause very large scale nuclear disaster, because in this scenario liquid plutonium will flow to land.


Those command systems are theoretically immune because they use special Unix or Linux based operating systems and there is used the only special checked code, what will not upload from the Internet. But there is a backdoor what might use with a cyber attack. If the key card will be reprogrammed with the computer virus, what will break in the system by door scanners could situation turn very bad. Computer virus can't destroy the operating system itself but it can remove databases of the system.


If backup systems don't connect automatically when problems will see, there is a risk that operational control will be loose is very real. Cyber weapons are more effective against civil ICT-infrastructure. This kind of attack may be for financial reasons, and it might use by criminals who want to make bank robbery with hacking. After hacking a system with master users password the criminal must cover his prints and after money transferring they could explode all logs of the system.


This is for deleting databases what mission is to collect information of data traffic, and that will make impossible to tracking those guys from the net. Otherwise using "logical bomb" will be used in simple blackmailing operation. After hiding malware to some company's network could criminals sent a letter to that company, that if the target will give them a million criminals will give code what helps them to remove the virus from the system of that company. Some cyber weapons just sent "ping" or "echo request" asks for the target system, what can't be used in normal Internet communication, and this kind of attack is called a denial of service attack.


The cyber attacker can also use malware for spying some systems. And that kind of malware can give any information what moves in target organization computers to the spy who collects data for production plannings and next year designs. That can cause very strong financial problems to a company what have spent time and money for a new design of a product.  And after that, some hacker steals that data and sells that to other companies what can begin production immediately. That's why stealing business secrets is against law.

Comments

Popular posts from this blog

Chinese innovations and space lasers are interesting combinations.

Above: "Tiangong is China's operational space station located in low Earth orbit. (Image credit: Alejomiranda via Getty Images)" (Scpace.com, China's space station, Tiangong: A complete guide) Chinese are close to making nuclear-powered spacecraft.  Almost every day, we can read about Chinese technical advances. So are, the Chinese more innovative than Western people? Or is there some kind of difference in culture and morale between Western and Chinese societies? The Chinese superiority in hypersonic technology is one of the things that tells something about the Chinese way of making things.  In China, the mission means. And the only thing that means is mission. That means that things like budgets and safety orders are far different from Western standards. If some project serves the Chinese communist party and PLA (People's Liberation Army) that guarantees unlimited resources for those projects. Chinese authorities must not care about the public opinion.  If we th

Iron Dome is one of the most effective air defense systems.

The Iron Dome is a missile defense system whose missiles operate with highly sophisticated and effective artificial intelligence. The power of this missile defense base is in selective fire. The system calculates the incoming missile's trajectory. And it shoots only missiles that will hit the inhabited area. The system saves missiles and focuses defense on areas that mean something. The system shares the incoming missiles in, maybe two groups. Another is harmless and another is harmful.  Things like killer drones are also problematic because their trajectories are harder to calculate than ballistic missiles. The thing that makes drones dangerous is that they can make masks for ballistic missiles. And even if those drones are slow, all of them must be shot down.  The thing is that the cooperation between drone swarms and ballistic missiles is the next danger in conflict areas. In the film, you can see how drones make light images of the skies. The killer drones can also carry LED li

The innovative shield that protects OSIRIS-APEX can also protect the new hypersonic aircraft.

"NASA’s OSIRIS-APEX spacecraft successfully completed its closest solar pass, protected by innovative engineering solutions and showing improvements in onboard instruments. Credit: NASA’s Goddard Space Flight Center/CI Lab" (ScitechDaily, Innovative Engineering Shields NASA’s OSIRIS-APEX During Close Encounter With the Sun) The OSIRIS-APEX probe travels close to the sun. The mission plan is to research the sun. And especially find things that can warn about solar storms. Solar storms are things that can danger satellites at the Earth orbiter. And the purpose of OSIRIS-APEX is to find the method of how to predict those solar storms. Another thing is that the OSIRIS-APEX tests the systems and materials that protect this probe against heat and plasma impacts.  The same technology. The researchers created for OSIRIS-APEX can used in the materials and structures. That protects satellites against nuclear explosions. That means this kind of system delivers information on how to prot