Cyberwarfare consists of coordinated mass intrusion attacks (AMD). Cyberattacks was discussed during a June summit between US and Russian presidents Joe Biden and Vladimir Putin. While the Biden-Putin summit looked “quite constructive”, cyberwarfare has still baffled politicians.
Imagine a series of coordinated mass disruption assaults similar to the recent ransomware attacks on SolarWinds and Colonial Pipeline.. For now, companies must prepare for the increased disruption and data loss from ransomware.
Major tremors may not cause great harm, but countries can lose their ability to function and respond to adversaries, economies can be crippled, and governments can be undermined. The 2015 cyberattacks in Ukraine provided a scenario for grounding a country with the help of a well-coordinated cyberattack.
The lesson is clear – the effects of cyberattacks are too severe to ignore. And pre-planned possibilities can be the only way to deal with them.
By 2020, IBM estimates losses from known cyberattacks at $1.5 billion.
The first is the increasing dependence on digital infrastructure and systems. The second is the steady increase in damage from criminal or government cyberattacks.
They provide enough justification for experts to warn against cybersecurity.
Other factors increase the risk even more. The complexity of the modern economy and its supply chains creates an environment of severe disruption. Mass shock attacks on seemingly inappropriate but well-chosen objects – such as infrastructure companies. These companies can create a domino effect that causes disruption and economic loss well beyond the reach of the target.
Russia used US cyber infrastructure to influence the 2016 election SolarWinds Inc., a software developer, Colonial Pipeline, an oil infrastructure company, and JBS, the world’s largest beef supplier, were all targeted in May 2021.
Currently, most cyberattacks originating in Russia employ specific tactics such as email phishing, ransomware as a service, and poor password practices.
Challenges to Treaties
Zero-day vulnerabilities arose the first time they have exploited. For example when the Stuxnet malware has successfully used as a digital “dirty bomb” to curb Iran’s nuclear ambitions.
The United States has known to exploit hardware vulnerabilities through highly sophisticated attacks and maintains supremacy in conducting sneak attacks.
More recently, governments have asked to co-sign agreements similar to other arms control treaties. To deal with the complexities of cyber warfare, political scientist Joseph Nye and others have proposed nuclear-like treaties, primarily because of the nuclear treaty’s ability to dictate the details.
Most attempts to contain mass shocks have resulted in deals being limited in scope or completely disintegrating before signing.
Unfortunately, cyberattacks do not use visible weapons, the compliance of which can be observe. In addition, the fine line between criminal and government attacks can be difficult to distinguish. An attack on a gas pipeline or meat packaging facility may seem criminal, but it can lead to a serious chain of events beyond the immediate target.
Rapid technological change and advances in cyber attacks make it difficult to predict strategies for future mass shocks in order to contractually react to them.
Defense Against CyberAttacks
Most mass intruder attacks exploit vulnerabilities that are easy to fix by maintaining normal digital hygiene and being wary of email phishing and password management.
Businesses need to take this practice seriously as vigilant proactive safeguards like COVID-19 can greatly reduce the problem.
Protective measures may be determine by national law. National debate has needed to reach consensus on the level of government interference and the level of protection for different types of data. This should result in demanding legislation that compels organizations to maintain a high level of security such as external backup and other safeguards.
On the other hand, the deep weak points embedded in hardware and operating systems cannot be overcome with normal digital hygiene. The United States dominates this vulnerability, skewing the balance of cybersecurity weapons in favor of the United States
Historically, nations have not completed arms races until situations of mutually guaranteed destruction arise. Russian cyberattacks can be see as an attempt to get to this point. Until we approach the point of mutually guaranteed destruction, don’t expect any international treaties any time soon. Instead, expect more cyberattacks and data loss. Organizations and governments need to be serious and close – it’s going to be a tough journey.