An Cosantóir

May 2017

An Cosantóir the official magazine of the Irish Defence Forces and Reserve Defence Forces.

Issue link: https://digital.jmpublishing.ie/i/816375

Contents of this Issue

Navigation

Page 19 of 39

An Cosantóir May 2017 www.dfmagazine.ie 20 | by PAUL O'BRIEN MA I nstead of using bullets and bombs, hackers use bits and bytes to attack central infrastructures. this new type of warfare is developing on a daily basis as em- bedded computers are running everything from cars to pacemakers; devices which are all hackable. While hackers remain anonymous, their reach is global. In recent months there have been two high-profile cyber at- tacks in Europe. There was a total shut down of TV5 Monde resulting in the cessation of transmission of a number of its channels and in Ukraine, an attack on two electricity grids resulted in a major power outage. While such attacks in the past have been attributed to computer nerds, there has recently been a worrying trend that insurgents and rogue nations are launching a new campaign of terror. The world is becoming more dependent on computers and a concentrated attack has the capability to take down power networks, water infrastructure, financial systems or air traffic control systems, causing chaos. While perimeter security at such complexes is high, network security can be lax. These threats are viable and reveal that there is a need to develop a full counter-cyber- attack capability. The internet has become a conduit for attack as cy- ber sabotage has become prevalent. We are all familiar with data breaches, identity theft and credit card fraud, to name but a few, but breaching protective computer programmes can have devastating effects. Hacking a programme protecting a pipeline could cause it to explode just as if it was attacked by a kinetic weapon. Hackers can also infiltrate industrial or military systems to steal data for cyber espionage utilising malware. Until recently, controls at power plants were mechanical switches, immune to cyber attack, but now with the drive to put everything on line, a hole has been created in our defences that no one seems able to plug. Entering malicious codes into a computer network or PLC

Articles in this issue

Links on this page

Archives of this issue

view archives of An Cosantóir - May 2017