![]() |
Cyberdefense is a complicated thing, and one of the greatest problems in that area is would the other side of the operation use it's best tools for handling enemy operation. So when some state is under the cyberattack, should it use physical force like bombing the targets, where the cyberattacks come, and in this kind of cases, the attacking computers can be remote-operated, what means that the attackers themselves are not wounded even if the smart weapon hits the target.
But when we are thinking possibility, that some operators would put the malicious tool in the Linux operating system, and that operating system would be used in the tactical systems like missiles and trolling servers. Would the operator uncover that it has access to every system, what is using that operating system, or rather saying what is the scale of the cyber- and other attacks, when that ability should be used?
If some operators can shut down every tactical system of the enemy by destroying the kernel of the operating system, it would cause very big troubles for the enemy offensive. And the other problem or threat is that the numbers in the systems like cannon and smart bomb targeting algorithms would be changed, and the systems would be lost their accuracy.
The one part of the cyberattacks can be cyber sabotage and cyber assassinations. The cyber sabotage can be that the centrifuges of the nuclear enriching process are adjusted wrong, and in the worst scenarios that thing would cause spontaneous fission, and nuclear explosion in the laboratory.
And in some cases, the algorithm that detects the people by their key cards or biometric access data would be turned to the assassination tool. That means when the targeted person would step in the elevator, the break will turn off, and that means the end for that person. This kind of thing might be devastating and horrifying scenarios in the cyber threat.
That kind of thing must be noticed, when the system is planned. And the thing is that that the most vulnerable systems are protected systems, which have the only couple of users. The thing that increases the level of a vulnerability is that the systems are supposed being safe. And there is no public data about the codes, what are making those programs.
If somebody could pass the firewall and have the source codes of the system, that can allow creating a virus, that cannot detect by using a normal firewall or antivirus software. The thing that those systems are located in the secret laboratories, and they are not updated makes them vulnerable, and the personnel that is operating those systems might be highly trained, but they might not experts in the cybersecurity. And if there is no firewall in the laboratory, the infected mobile telephone can slip the malicious software inside those systems.
But when we are looking at the cases, like when Israeli aircraft lost from radar during an air raid to Syria the reason for that is probably not necessary be the cyber attack. The military forces around the world have been tested plasma-shields or so-called echo-radiation, which means that the radar impulses just turn away from the front of attacking aircraft. Plasma ionized gas is more effective for that purpose because it affects every frequency of radio transmitting.
And the target can be found by using laser scanners and other optical sensors. But things like computer viruses are also a very good way to increase the effect of things like radars. The program code can simply install or involve the radar transmitting, and that means that it would give more effect to that system if it can infect targeted things, but if the infection is not successful the radar can use to locate targets.
Picture:
https://amp.businessinsider.com/images/5ba0c0575c5e52537d8b4ead-750-569.jpg
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.