Scattered Clouds
clouds

18 April 2024

Amman

Thursday

71.6 F

22°

Home / View Points

Can a digital nuclear bomb be imagined?

31-10-2024 04:24 PM


Dr. Jihad Al-Qadimat
I got the idea to write this article from the American film Canary Black, directed by Pierre Moral. The term "Digital Nuclear Bomb" refers to a cyberattack with a wide-ranging destructive capability comparable to a nuclear bomb in conventional warfare. The idea here is not that the cyberattack will explode or leave radioactive dust, but rather that it has devastating effects that can disable nations or essential systems and computer networks to cause damage, breach sensitive information, or disrupt operations, affecting vital institutions for extended periods. The forms of these destructive attacks can be outlined, These include: Disruptive Attacks, which flood the system with fake requests, leading to a complete shutdown; Espionage Attacks, which aim to obtain confidential and sensitive information, such as personal data or business and military information; in addition to Ransomware Attacks, where the attacker encrypts the system's data and demands a ransom for decryption; and Phishing Attacks, which deceive users into providing their personal information, such as passwords and credit card numbers.

Imagine a successful cyberattack on a country's infrastructure, such as power grids, healthcare systems, banking systems, or communications, targeting their simultaneous destruction. This would result in a complete collapse of national capabilities; hospitals and banks would cease to operate, and buying and selling activities would stop, isolating the country from the world. Even if the effects were not permanent, the economic and social losses would be immense.

Who knows? We may wake up one day to find all aspects of life disrupted, with no electricity, no water, no transportation or communications. Schools, universities, and factories may shut down, and banks, fuel pumps, trains, and all means of transportation may come to a halt for repeated and extended periods.

With the increasing reliance on technology in our daily lives, the significant expansion of digital transformation, and the use of artificial intelligence and the Internet of Things (IoT) along with smart phones, the impact is not confined to a specific entity or country, and it opens the door to unlimited possibilities and speculations for disrupting daily life.

The severity of this threat escalates due to its rapid spread across the globe, affecting multiple networks and various systems. Once the main systems are breached, malware can proliferate through the sub-systems like dominoes. Additionally, the difficulty of concealment and tracking poses challenges; in traditional warfare, the effects of an attack can be observed and its source identified with relative ease. However, in the digital realm, it can be challenging to determine the nation or entity responsible for the attack, as identity can be concealed and digital tracking can be misled in multiple ways. Furthermore, the cost of such attacks is relatively low compared to their destructive power. While nations need to build nuclear arsenals at exorbitant costs, digital weapons can be developed at relatively lower expenses by countries or even non-governmental entities, making this threat more accessible, even to nations with limited capabilities.

These digital weapons are used in the cold wars between major powers like the United States, Russia, and China, or against weaker nations, or even against economic systems and giant corporations. Developing offensive or defensive digital capabilities is part of their competitive strategy, serving as soft but deadly weapons that can be highly destructive.

The world is witnessing a tremendous development in information and communication technology. With the increasing reliance on digital systems across various sectors, it poses a challenge to national security through espionage or internal sabotage, which may lead to data loss or losses in the billions. Among these devastating digital impacts, which resemble the effects of nuclear bombs in terms of the severity of the damage, is the disruption of critical infrastructure by targeting sensitive systems such as power grids, water supply, hospitals, transportation, financial markets, and government services. This can result in a complete paralysis of state or regional services, leading to a loss of trust in these organizations, and it may also cause long-term social and security implications.

These risks require robust cybersecurity strategies, which involve developing a set of techniques, procedures, and practices designed to protect digital systems, networks, computers, software, and data from cyberattacks, unauthorized access, or digital damage. Additionally, advanced precautionary measures are needed to safeguard infrastructure and vital information. In other words, cybersecurity aims to achieve high levels of security to prevent electronic threats that may range from data theft or manipulation to destruction, as well as disruption of the systems and services that organizations or individuals rely on.

Today, cybersecurity is an essential part of any infrastructure or technological system. It is not just about protecting individuals or institutions; it is a necessity for national security. Among the most important components of cybersecurity are protecting internal and external networks from electronic threats, securing data from unauthorized access, and ensuring its integrity and confidentiality. Additionally, it involves developing plans to recover systems and data in the event of a cyberattack.

Several countries around the world have experienced cyberattacks, including: the Stuxnet attack (2009-2010), which targeted urani um enrichment facilities in Iran and disabled many centrifuges; the Sony Pictures attack (2014), where Sony Pictures was targeted, resulting in the theft of sensitive information that was then published online; and the NotPetya attack (2017), which targeted Ukrainian companies and international institutions, causing massive economic losses estimated in the billions of dollars, disrupting operations in large companies, including shipping firms and hospitals, and cutting off electricity to thousands of homes. The SolarWinds attack (2020) is considered one of the most dangerous modern attacks, as it led to the breach of systems at numerous U.S. government agencies and major companies by planting malware in the company's software updates, allowing attackers to gather sensitive information from the compromised systems over several months. The Colonial Pipeline attack (2021) targeted a company that manages the main oil pipelines in the United States using ransomware, causing a halt in oil transport in some areas, resulting in a temporary fuel crisis and rising prices. Lastly, the attack on hospitals in Ireland (2021) targeted several hospitals, leading to disruptions in health services and the suspension of non-essential surgeries, forcing the health system to operate without digital systems for some time, which affected the level of healthcare.

To avoid digital attacks, countries, organizations, and individuals need to follow a set of preventive measures and rely on advanced tools and techniques. These include, for example, regularly updating systems and software, as new security vulnerabilities are often discovered, prompting the release of updates to address these gaps. Additionally, using firewalls and intrusion detection systems, as well as strong data encryption to protect sensitive information, makes it difficult for hackers to read the data even if they gain access to it. Furthermore, adopting Multi-Factor Authentication (MFA) contributes to increasing security levels by requiring an additional verification step, such as a temporary code sent to a phone or an authentication app.

It is also important to raise awareness among employees and users about the risks of digital attacks on networks and to teach them how to recognize malicious emails or phishing attempts. Organizations should conduct regular data backups to avoid data loss, especially in the event of ransomware attacks, and ensure that backups are stored securely away from network access. Experts recommend minimizing privileges and access rights for employees, so that each person has the minimum access necessary to perform their job, thereby reducing risks if their account is compromised. Finally, it is essential to respond to digital attacks with agility and speed by preparing a rapid incident response plan to ensure quick and effective handling in the event of an attack.

It is worth to say that adopting digital transformation without standards and controls, and the increased use of artificial intelligence (AI), heightens the likelihood of digital attacks, thereby creating a genuine impediment to digital transformation and hindering the benefits of AI. In other words, it introduces new vulnerabilities, even as it enhances operational efficiency and improves performance. This necessitates leadership that is aware of these risks and capable of allocating the necessary resources to implement protection strategies, which include emergency planning, crisis management, and reliance on the latest security technologies.




No comments

Notice
All comments are reviewed and posted only if approved.
Ammon News reserves the right to delete any comment at any time, and for any reason, and will not publish any comment containing offense or deviating from the subject at hand, or to include the names of any personalities or to stir up sectarian, sectarian or racial strife, hoping to adhere to a high level of the comments as they express The extent of the progress and culture of Ammon News' visitors, noting that the comments are expressed only by the owners.
name : *
email
show email
comment : *
Verification code : Refresh
write code :