Personal tools
You are here: Home Research Trends & Opportunities New Media and New Digital Economy Cyberwarfare and Future Cybersecurity

Cyberwarfare and Future Cybersecurity

San_Francisco_467230
(Bay Area/San Francisco, California - Jeff M. Wang)

 

- Cyberwarfare

Cyber warfare is essentially warfare between states, albeit conducted in the cyber realm. It consists of states (and state-sponsored agencies) launching cyber attacks against each other.

The objectives of launching these attacks are various. Sometimes, the motive is to steal corporate or state secrets. Sometimes, an attack aims to disrupt critical infrastructure, or merely infect the software behind this infrastructure and lay silent until it is needed. Needless to mention, some attacks seek to influence elections, either by directly hacking voting software or distributing propaganda among crucial voters.

There are three key pieces of technology, though, that are likely to drive the development of cyberwarfare in the coming decade. 

  • Machine Learning And AI: Artificial Intelligence is already being deployed in a wide range of situations, and it is likely that governments are already incorporating it into their cyber weapons.
  • The Cloud: Cloud storage represents both a risk and an asset when it comes to cyber warfare. On one hand, distributed storage can make critical information easier to steal, because an attacker only needs to identify one weak machine in order to compromise a system. On the other hand, with the correct encryption, cloud storage can actually be more secure than physical drives.
  • Blockchain: Blockchain is also likely to revolutionize cyber warfare in the coming years. By providing a secure way to share key information between multiple users, it promises to protect data from the most common types of cyber attack. On the other hand, we don't think it will be long before even blockchain is compromised

 

- Future Cybersecurity

Our daily life, economic vitality, and national security depend on a stable, safe, and resilient cyberspace. Cyberspace and its underlying infrastructure are vulnerable to a wide range of risk stemming from both physical and cyber threats and hazards. Sophisticated cyber actors and nation-states exploit vulnerabilities to steal information and money and are developing capabilities to disrupt, destroy, or threaten the delivery of essential services. 

Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These attacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes. Implementing effective cybersecurity measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative. 

For example, by 2025, it is estimated that there will be more than to 21 billion Internet of Things (IoT) devices. Cybercriminals will continue to use IoT devices to facilitate DDoS attacks. In 2016, the world was introduced to the first “Internet of Things” malware - a strain of malicious software that can infect connected devices such as DVRs, security cameras, and more. The malware accessed the devices using default password and usernames. The malware turned the affected devices into a botnet to facilitate a Distributed Denial of Service (DDoS) attack, which aims to overwhelm websites with internet traffic. The attack ended up flooding one of the largest website hosting companies in the world, bringing a variety of major, well-known websites and services to a halt for hours.

IoT security focuses on protecting your Internet-enabled devices that connect to each other on wireless networks. IoT security is the safety component tied to the Internet of Things, and it strives to protect IoT devices and networks against cybercrime.

 

 


[More to come ...]

 

 

Document Actions