Cyber Threats, high social impact but … which is the level of awareness?

Last week I had the opportunity to discuss with my father of adverse economic situation and in particular of the Italian public spending. I have introduced some reference to the arms and in particular cyber weapons.

What are they? What are the threats we face? What is the social cost to fight and mitigate the threats?

Without any surprise, I soon realized that he was not informed on the subject. I retried the experiment in the following days asking same questions to the common people, from workers to the engineers, through some politicians, and even into the latter category have not found the expected response.  The level of awareness of the threat is very low and I believe this is due to the will of the governments intend to give information on the subject. The argument is thorny, uncomfortable, on which the debate is always “open” to an audience of specialists is often restricted. Unthinkable for common people that a computer virus can cause damage to the real world and that its development process can be very expensive. A millionaire investment to create a weapon capable of undermining the proper functioning of control systems of a nuclear power plant with obvious consequences on the population. When describing the threats people remain perplexed, amazed … is it possible that the shadow of a malware can cause death in the real world? Unfortunately yes.

Recently the Pentagon has announced the development of a list of cyber-weapons and tools that include malware capable of sabotaging the critical systems of a possible hostile countries. The United States does not represent an exception, the tendency to strong investment in the sector is widespread. The integration of cyber-technologies into government arsenals is perhaps the most significant operational development in military cyber doctrine in years.

I propose to you some passages from an article (List of cyber-weapons developed by Pentagon to streamline computer warfare) published in The Washington Post

The framework clarifies, for instance, that the military needs presidential authorization to penetrate a foreign computer network and leave a cyber-virus that can be activated later. The military does not need such approval, however, to penetrate foreign networks for a variety of ther activities. These include studying the cyber-capabilities of adversaries or examining how power plants or other networks operate. Military cyber-warriors can also, without presidential authorization, leave beacons to mark spots for later targeting by viruses.”

I find these sentences full of meaning that make the idea of the perceived level of critical facilities and government Agencies.  To give a dimension to investment made is absolutely impossible because of the paucity of information available about the topics, for sure we are dealing with figures that represent a substantial portion of the major expenditure budget of a Nation. If we are dealing with a government commitment so strong and threats that can definitely affect the security of a Nation like a pandemic flu, why do not provide transparency on the subject?  Why should  taxpayers  not be sensitized on the issues?

In 2009, official sources claimed a voice in the Cyber ​​Defense spending in just six months of about $ 100 Million . We are facing is the tip of the iceberg, do not need much imagination to understand the dimensions of the expenses incurred in the last two years.

So far we dealt with those who are the direct costs incurred by Nations to meet the threats of cyber attacks, ignoring the impact of these have on the social fabric and in particular about the companies. The productive apparatus of a nation is composed of a multitude of companies who suffer the threats significantly. Consequence is the increase in expenditure that they incur in order to deal with obvious adverse impact on their finances.

Let’s give a look on interesting benchmark Study of U.S. Companies, the Second Annual Cost of Cyber Crime Study.

We are dealing with a vicious mechanism for which the economic difficulty that arises on the approach to cyber threats, has led to a more or less overt instability of supply and its cost of production. Loss of jobs, loss of competitiveness of our companies, inability to protect the know-how of the company, they represent a cost that the taxpayer always pays ignoring it!

Of course my post is intended as a starting point for a series of reflections on the impact of cyber threat in daily life with particular reference to the economic impact that is perceived by the citizen.

Let us consider an open discussion of which this article will be the introduction and whose continuation is in your hands.

Thanks

Pierluigi Paganini

 

Resorces:

http://www.arcsight.com/collateral/whitepapers/2011_Cost_of_Cyber_Crime_Study_August.pdf

http://www.huffingtonpost.com/2011/11/17/norway-cyberattack_n_1100461.html

http://www.defencetalk.com/cyber-defense-cost-pentagon-100-million-in-six-months-17561/

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

U.S. Gov imposed Visa restrictions on 13 individuals linked to commercial spyware activity

The U.S. Department of State imposed visa restrictions on 13 individuals allegedly linked to the…

1 hour ago

A cyber attack paralyzed operations at Synlab Italia

A cyber attack has been disrupting operations at Synlab Italia, a leading provider of medical…

2 hours ago

Russia-linked APT28 used post-compromise tool GooseEgg to exploit CVE-2022-38028 Windows flaw

Russia-linked APT28 group used a previously unknown tool, dubbed GooseEgg, to exploit Windows Print Spooler…

12 hours ago

Hackers threaten to leak a copy of the World-Check database used to assess potential risks associated with entities

A financially motivated group named GhostR claims the theft of a sensitive database from World-Check…

20 hours ago

Windows DOS-to-NT flaws exploited to achieve unprivileged rootkit-like capabilities

Researcher demonstrated how to exploit vulnerabilities in the Windows DOS-to-NT path conversion process to achieve…

23 hours ago

A flaw in the Forminator plugin impacts hundreds of thousands of WordPress sites

Japan's CERT warns of a vulnerability in the Forminator WordPress plugin that allows unrestricted file uploads…

1 day ago

This website uses cookies.