When Digital Attacks Turn Physical: National Security in the Age of Cyber Threats
Keywords:
Cyber Security, Cyber Attack, Sabotage, Hackers, National Security, Civil SafetyAbstract
Cyber attacks are usually aimed at compromising personal, business or state sensitive information and IT systems, either for gaining access to data, finance or performing online sabotage. The world has seen various examples of cyber attacks affecting everyday life, from delaying or cancelling multiple flights to the destruction of physical infrastructure. The paper explores the growing interconnection between cyberspace and the physical world, emphasizing how cyber incidents targeting critical infrastructure, such as healthcare facilities, energy systems or transportation networks can directly endanger citizens’ safety and disrupt national resilience. The reader will have an overview of the key challenges in the cyber space, which is an alarm for the national security. The text analyses various cyber attacks which managed to affect citizens’ physical security and pose serious threats to the overall security of the countries. Emphasis will be made on the nature of the modern cyber space and how malicious actors adapt to changes in the world, demanding both private and state sector to be cyber aware and alert to avoid becoming victims. The research highlights the current vulnerabilities and makes prognosis for the future, how and why cyber attacks can cause even more danger to everyday life. Moreover, information will be provided about the possible solutions, based on the foreign experience, research data and statistics. The study concludes that safeguarding national and citizen security in the 21st century requires not only technological adaptation, but also strategic foresight and coordinated governance at all levels, in all sectors.
Downloads
References
L. Johnson, “WannaCry: Ransomware attacks show strong links to Lazarus group,” Broadcom, 2017. [Online]. Available:
Osborne, “Colonial Pipeline ransomware attack: Everything you need to know,” ZDNet, 2021. [Online]. Available: https://www.zdnet.com/article/colonial-pipeline-ransomware-attack-everything-you-need-to-know/
Duckett, “Incremental improvements are not enough as Biden signs order boosting US cyber posture,” ZDNet, 2021. [Online]. Available: https://www.zdnet.com/article/biden-signs-order-boosting-us-cyber-posture-saying-incremental-improvements-are-not-enough/
Congressional Research Service, “Cybersecurity: Selected cyberattacks, 2012–2021,” Congressional Research Service, 2021. [Online]. Available:
https://crsreports.congress.gov/product/pdf/R/R46974
E. Sanger, N. Perlroth, and E. Schmitt, “Scope of Russian hacking becomes clear: Multiple US agencies were hit,” The New York Times, Dec. 14, 2020. [Online]. Available: https://www.nytimes.com/2020/12/14/us/politics/russia-hack-nsa-homeland-security-pentagon.html
International Telecommunication Union, “Global Cybersecurity Index 2020,” ITU, 2020. [Online]. Available: https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2021-PDF-E.pdf
Jibilian and K. Canales, “The US is readying sanctions against Russia over the SolarWinds cyber attack,” Business Insider, 2020. [Online]. Available:
https://www.businessinsider.com/solarwinds-hack-explained-government-agencies-cyber-security-2020-12
K. Zetter, “An unprecedented look at Stuxnet, the world’s first digital weapon,” WIRED, Nov. 2014. [Online]. Available: https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/
L. Carter, “10 biggest cyber attacks in history,” Clear Insurance, 2022. [Online]. Available: https://clearinsurance.com.au/10-biggest-cyber-attacks-in-history/
M. Baezner and P. Robin, “Stuxnet,” ResearchGate, 2018. [Online]. Available: https://www.researchgate.net/publication/323199431_Stuxnet
RISIDATA, “CIA Trojan causes Siberian gas pipeline explosion,” RISIDATA Database. [Online]. Available: https://www.risidata.com/index.php?/Database/Detail/cia-trojan-causes-siberian-gas-pipeline-explosion
RISIDATA, “Baku–Tbilisi–Ceyhan pipeline explosion,” RISIDATA Database. [Online]. Available: https://www.risidata.com/Database/Detail/baku-tbilisi-ceyhan-pipeline-explosion
Specops Software, “The countries experiencing the most ‘significant’ cyber-attacks,” Specops Software Blog, 2023. [Online]. Available: https://specopssoft.com/blog/countries-experiencing-significant-cyber-attacks/
“Colonial Pipeline ransomware attack,” Wikipedia, 2021. [Online]. Available: https://en.wikipedia.org/wiki/Colonial_Pipeline_ransomware_attack