Over the last fifty years, the world has witnessed some of the greatest advances in energy, information technology, and modern infrastructure the world has ever seen. Unfortunately, these same advances have opened up somewhat of a Pandora’s box, exposing the world to threats and vulnerabilities that no one could have imagined a few short decades ago.
Despite what governments may actually admit to, almost every developed country in the world is under attack. But this new type of warfare is not being fought on the battlefields, it’s being fought in cyberspace by an enemy that is incredibly difficult to detect and defeat.
The attacks in cyberspace are being launched by military cyber teams, terrorist organizations, and anonymous hacker groups. Even scarier is the fact that a lone hacker, with the right know-how and resources, can singlehandedly take down entire power grids, financial systems, and other vital infrastructure.
The attacks are targeting both government systems and private corporations but can also affect private individuals who are at risk of identity theft, cleaned out bank accounts, and threats that haven’t even been thought of yet. This new frontier in warfare is extremely dangerous, and in my opinion, we have only begun to see what’s really possible.
Throughout the world, vital infrastructure like energy, telecommunications, and transportation systems are incredibly vulnerable to attack and are being targeted twenty-four hours a day, seven days a week.
To get an idea of how serious the threat is, you need to understand what is being targeted and what would happen if one of these systems was maliciously penetrated.
There are a number of critical infrastructure sectors that are ripe for attack:
Many of these sectors are controlled by SCADA (Supervisory Control and Data Acquisition) systems, which were previously thought impenetrable. Unfortunately, recent events suggest that might not be the case.
In a 2013 report prepared for the Department of Homeland Security, engineers proved they could penetrate and shut down almost every major industrial control system they tested. These findings were a real wake-up call, but were only the tip of the iceberg.
Even systems that were once thought impenetrable because they supposedly lacked connections to the outside world have been attacked using highly sophisticated computer worms that took advantage of vulnerabilities in Windows-based systems used to program industrial control systems.
It’s really only a matter of time before some hacker, terrorist organization, or rogue world government uses these vulnerabilities to target multiple critical infrastructure sectors. When this happens, all hell is going to break loose.
A coordinated attack on any of these critical infrastructure sectors could bring a country or the entire world to its knees. Imagine a scenario where someone was able to shut down either part or all of a nation’s power grid, while at the same time disabling telecommunication systems and other key infrastructure. Now are you starting to get a picture of how bad things can get?
While there’s probably very little you can do to prevent a large-scale cyber attack on the infrastructure, the average person can do a lot to protect him or herself on a personal level.
Make sure the operating systems of your personal computers, tablets, and smartphones are always up-to-date. This is one of the best things you can do to protect yourself, and to some extent, the rest of the world. When patches or operating system upgrades are released, install them as soon as possible. Installing the updates can limit your vulnerability to attack by people who have discovered holes in older operating systems.
Even surfing what may seem like a completely safe website can be like playing a game of electronic Russian roulette. Some of the largest and most well-known websites in the world have been hacked, increasing the possibility of your computer being affected with malicious code.
We are living in an age in which everyone seems to want to share his or her life story online. But if you wouldn’t tell a stranger on the street this information, why would you consider sharing it online where the entire world can see? Keep in mind that every piece of data, thought, or information you share online is out there forever. You can never get it back, and you can never undo what’s been done.
Beware of anything that looks or feels suspicious. Even something as innocent as a USB device that someone gives you can be a clever attempt to spread malicious code and infect an entire network. This is especially true if you work in a high-risk industry with tight Internet security. Criminal hackers will target unknowing employees in the hopes of penetrating these closed networks.
Preparing for a widespread cyber attack is really no different than preparing for any other type of disaster where you may be without essential services for an extended period of time. The plans you created using the information in chapter two will help you prepare for the chaos you’ll likely face as a result of a large-scale cyber attack.