Research On Cyberwarfare: Cyberattacks, Experiments, And Future Predictions: [Essay Example], 876 words GradesFixer
exit-popup-close

Haven't found the right essay?

Get an expert to write your essay!

exit-popup-print

Professional writers and researchers

exit-popup-quotes

Sources and citation are provided

exit-popup-clock

3 hour delivery

exit-popup-persone
close
This essay has been submitted by a student. This is not an example of the work written by professional essay writers.

Research On Cyberwarfare: Cyberattacks, Experiments, And Future Predictions

Download Print

Pssst… we can write an original essay just for you.

Any subject. Any type of essay.

We’ll even meet a 3-hour deadline.

Get your price

121 writers online

blank-ico
Download PDF

Mette Eilstrup-Sangiovanni defines cyberwarfare as “deliberate and hostile use by a state of a cyber weapon with the intention of causing injury or death to persons, and/or to significantly disrupt, damage, or destroy another state’s strategic assets or critical national infrastructure. ” (Eilstrup-Sangiovanni, 2018)What would a cyberwar look like? In this essay I will examine cyberattacks and experiments, such as Stuxnet, The Aurora Generator Test, the failed Iranian hack on Bowman Avenue dam in New York, and Russian cyberattacks on the Ukrainian power grid. I will try to predict the future possibility of cyberattacks, and what a cyberwar might look like, including the effect of the growing internet of things and possible effects of Digital twins. I will start with what is probably the most famous cyberattack, Stuxnet. The Stuxnet Worm was the first “cyber warfare weapon” ever, it was used to sabotage an Iranian nuclear site. (Langner, 2011). Stuxnet entered the system via an infected USB key. The worm presented itself with a trusted digital certificate to fool any windows operating system it found. The worm then searched the local network for any Siemens programmable logic controllers (PLCs), as its code was specific to Siemens.

  1. An examlple of The siemens controller infected
  2. An example of the Centrifuges being controlled

The code firstly just monitored the Siemens controllers, doing no damage to the machines, however after a complex system of timers and messages, the worm sent messages to any output devices on the network telling them that everything was working normally, while simultaneously causing centrifuges to spin incredibly quickly until they broke down. (A centrifuge is a Cylinder which usually contains a gas, which spins quickly, in this case it is used to enrich uranium). This cost Iran a lot of money and set them back in their nuclear efforts. Stuxnet is an important example, as the code was far too complex and specific for any small group of hackers. It was very likely a co-ordinated attack from at least one country to sabotage another. Stuxnet was “reportedly developed and launched by the United States and Israel” (New Jersey Cybersecurity and Communications Integration Cell, 2017).

The attack was also different as it was a military action. “Stuxnet’s goal was to physically destroy a military target-not just metaphorically, but literally. ” (Langner, 2011). This attack was not to gain information or extort money, it was a precision attack from one country to another. Cyberattacks usually occur on SCADA (Supervisory control and data acquisition) systems. A PLC is an example of a Scada system. SCADA is used in a wide range of industries, and with the growing internet of things, its use will only become more widespread. For example, although the united states are one of the leaders in Cyberwarfare, they are also one of the most vulnerable countries to cyberattack because of their use of internet of things. Amy Zegart says in her tech talk on cyberwarfare “The United States are the most vulnerable why because we’re the most connected we rely on networks and connectivity for our economy for our civil society for our government for our military” (Zegart, 2017). In future it is possible that most machinery and vehicles will be automated or remotely operated.

The next case I will talk about is the Aurora Generator test. This test caught the attention of the public in the United States. This was a test carried out by homeland security, they hacked into an isolated generator and caused it to overheat and break down. “The project was conducted to determine if a cyber-related event could cause physical damage to critical hardware” (Robert Radvanovsky, 2013). The test showed how easy it would be to take a generator offline, but what if a co-ordinated attack broke most if not all electric generators in a country? There would be blackouts across that country, some could last weeks if the generators had completely been made completely redundant. This could cripple a country, cause numerous riots, and slow a countries reaction time and ability in the event of an actual war. The Aurora Test helps us visualise what an attack might look like, cyberattacks on public infrastructure causing massive damage and rendering them useless. Attacks could happen in other areas, if an attack took place inside a datacentre for example, causing fans to overload until they physically broke, would create a situation where several extremely expensive servers are permanently damaged beyond repair within minutes, causing potentially billions of dollars of damage.

The worst-case scenario of a highly co-ordinated, well planned cyberattack, affecting all possible systems in a country, could be devastating to services, the economy and social order. Could a cyberattack lead directly to loss of life? Here we come to the Iranian hack on Bowman Avenue dam in New York. A group known as the “Islamic Revolutionary Guards Corps” (Thompson, 2016) gained control of the “command and control system”. (Thompson, 2016) These attackers could have opened the dam had it not been for a manual lever being disconnected. It should be noted that this was a small dam and perhaps did not have the same cybersecurity as others in America, however the idea of remotely opening a dam to cause damage and death from across the world shows how terrifying a cyberwar could be.

Remember: This is just a sample from a fellow student.

Your time is important. Let us write you an essay from scratch

100% plagiarism free

Sources and citations are provided

Cite this Essay

To export a reference to this article please select a referencing style below:

GradesFixer. (2020). Research On Cyberwarfare: Cyberattacks, Experiments, And Future Predictions. Retrived from https://gradesfixer.com/free-essay-examples/research-on-cyberwarfare-cyberattacks-experiments-and-future-predictions/
GradesFixer. "Research On Cyberwarfare: Cyberattacks, Experiments, And Future Predictions." GradesFixer, 14 Jul. 2020, https://gradesfixer.com/free-essay-examples/research-on-cyberwarfare-cyberattacks-experiments-and-future-predictions/
GradesFixer, 2020. Research On Cyberwarfare: Cyberattacks, Experiments, And Future Predictions. [online] Available at: <https://gradesfixer.com/free-essay-examples/research-on-cyberwarfare-cyberattacks-experiments-and-future-predictions/> [Accessed 15 August 2020].
GradesFixer. Research On Cyberwarfare: Cyberattacks, Experiments, And Future Predictions [Internet]. GradesFixer; 2020 [cited 2020 July 14]. Available from: https://gradesfixer.com/free-essay-examples/research-on-cyberwarfare-cyberattacks-experiments-and-future-predictions/
copy to clipboard
close

Sorry, copying is not allowed on our website. If you’d like this or any other sample, we’ll happily email it to you.

    By clicking “Send”, you agree to our Terms of service and Privacy statement. We will occasionally send you account related emails.

    close

    Attention! this essay is not unique. You can get 100% plagiarism FREE essay in 30sec

    Recieve 100% plagiarism-Free paper just for 4.99$ on email
    get unique paper
    *Public papers are open and may contain not unique content
    download public sample
    close

    Sorry, we cannot unicalize this essay. You can order Unique paper and our professionals Rewrite it for you

    close

    Thanks!

    Your essay sample has been sent.

    Want us to write one just for you? We can custom edit this essay into an original, 100% plagiarism free essay.

    thanks-icon Order now
    boy

    Hi there!

    Are you interested in getting a customized paper?

    Check it out!
    Having trouble finding the perfect essay? We’ve got you covered. Hire a writer

    GradesFixer.com uses cookies. By continuing we’ll assume you board with our cookie policy.