Many military leaders believe that it is appropriate to “prepare the battlefield” for cyber-war by having cyber “weapons” in place to use in the event of a military crisis. From my point of view, previous occasions of cyber-attacks evidently demonstrate and justify the strong resolve to advance a strong cyber warfare capacity. In fact, a host of radical groups seem to be in pursuit of such endeavors and are seeking to build cyber warfare programs. As such, there are high chances of one of the groups by-passing all the security measures and carrying out a hack that results in deaths of people, causing damage to property and resulting in panic and terror (Beidleman, 2009). It is for a fact that susceptible targets exist in the cyber space and as such, it is possible that some of them may fall under attack and result in destruction and loss of lives. Considering that the Internet is global and enables hackers to attack systems without travelling while virtually bouncing their locations across the world, it becomes increasingly necessary to have cyber “weapons” in place to use in the event of a military crisis.
Security experts are very concerned about the risk that the nation’s SCADA and control systems could become targets in the event of a cyber-war. However, most of these systems are controlled by commercial companies. Owing to their massive significance, the government should be able to mandate that these commercially owned SCADA and control systems be protected with the highest levels of security. Notably, SCADA and control systems control various key infrastructure and face attacks such as the Curran-Gardner plant that was compromised via an anomalous access to the SCADA system using SCADA system log- on credentials (Nicholson et al., 2012). With the aid of authentic log-on credentials and the ability to bounce off multiple IP addresses, hackers manage to obfuscate the origins of the attack. As such, optimal security needs to be provided for SCADA by pinpointing the location, time, and duration of any attempts on entry into the SCADA system log files.
Delegate your assignment to our experts and they will do the rest.
References
Beidleman, S. W. (2009). Defining and Deterring Cyber War . ARMY WAR COLL CARLISLE BARRACKS PA.
Nicholson, A., Webber, S., Dyer, S., Patel, T., & Janicke, H. (2012). SCADA security in the light of Cyber-Warfare. Computers & Security , 31(4), 418-436.