Like what you've read?

On Line Opinion is the only Australian site where you get all sides of the story. We don't
charge, but we need your support. Here�s how you can help.

  • Advertise

    We have a monthly audience of 70,000 and advertising packages from $200 a month.

  • Volunteer

    We always need commissioning editors and sub-editors.

  • Contribute

    Got something to say? Submit an essay.


 The National Forum   Donate   Your Account   On Line Opinion   Forum   Blogs   Polling   About   
On Line Opinion logo ON LINE OPINION - Australia's e-journal of social and political debate

Subscribe!
Subscribe





On Line Opinion is a not-for-profit publication and relies on the generosity of its sponsors, editors and contributors. If you would like to help, contact us.
___________

Syndicate
RSS/XML


RSS 2.0

The challenges of cyber-security

By Keith Suter - posted Wednesday, 17 May 2017


The "WannaCry" computer virus has caused problems in many countries. It has infected computers and locked up files so that the owners need to pay a "ransom" to get back access to their data. It is still not known who is behind this computer attack.

The attack is yet another reminder of the dangers of the new computer era into which we are heading. This new era has four characteristics: (i) "digital disruption" (ii) cyberwar (iiii) reputational risk and (iv) governments and societies are unprepared for the shocks to come.

A convenient date for the beginning of "digital disruption" is the prediction by Gordon Moore of Intel on April 19 1965 that the power of computers will double every 18 months-2 years and the price of computers will halve every 18 months-2 years. This process has continued.

Advertisement

For example, Google is developing driverless cars and Mercedes driverless trucks. The speculation is: will human drivers be gone in 15 years?

On the one hand, for how long will we continue to allow (dangerous) humans to drive vehicles (road crashes kill 1.2million people around the world each year). Driverless vehicles are bound to be safer.

On the other hand, motor vehicles are a central part of a modern economy and the fear is that a lot of people will become unemployed. Truck drivers will not be needed. Many ancillary services will also disappear, such as roadside cafes (computers don't need snacks).

Kodak is a current example of digital disruption. Photographers no longer need Kodak for colour photographs. Since 1838 3.5 trillion photographs have been taken; more photos are now taken every two minutes (on 2.5 billion cameras/ smart phones) than were taken in all the 19th century. But Kodak itself is virtually broke.

Second, cyber-warfare is now the fifth dimension of warfare (after land, sea, air, and space). Cyber-warfare is inevitable because too much of humankind's affairs are being linked via information technology. Critical infrastructure is vulnerable to attack.

There will not be a need to invade a country. An enemy could just destroy the communications systems, for example, infrastructure. The next big terrorist attack on New York, for example, could be the disruption of the city's water supply (whose infrastructure is already run down and vulnerable). Traffic light systems could also be disrupted remotely. (A lesson from the WannaCry "ransomware" attack is how many public institution still use old software systems; there may have been financial problems in upgrading them).

Advertisement

A third dimension is reputational risk. There are many potential categories of cyber-attackers: hostile governments, criminal groups, politically-motivated "hacktivists", "script kiddies" (bored younger people who want to see what they can get away with), and terrorist groups.

There is also a wide range of "soft" targets: transport infrastructure, water and sanitation, fuel supplies, distribution centres, computer-controlled ground stations, mass deletion of government data, hacking hospital IT systems to murder patients on life support systems ("hacked to death"), and car-jacking (hacking into a car's IT system to crash it).

The extent of the problems may be obscured because some institutions may prefer to keep quiet rather than admit to having problems (especially in the private sector). When the attack is revealed it causes damages to the reputation of the institution or company affected.

  1. Pages:
  2. Page 1
  3. 2
  4. All


Discuss in our Forums

See what other readers are saying about this article!

Click here to read & post comments.

19 posts so far.

Share this:
reddit this reddit thisbookmark with del.icio.us Del.icio.usdigg thisseed newsvineSeed NewsvineStumbleUpon StumbleUponsubmit to propellerkwoff it

About the Author

Dr Keith Suter is a futurist, thought leader and media personality in the areas of social policy and foreign affairs. He is a prolific and well-respected writer and social commentator appearing on radio and television most weeks.

Other articles by this Author

All articles by Keith Suter

Creative Commons LicenseThis work is licensed under a Creative Commons License.

Photo of Keith Suter
Article Tools
Comment 19 comments
Print Printable version
Subscribe Subscribe
Email Email a friend
Advertisement

About Us Search Discuss Feedback Legals Privacy