Computers and WEAPONS. Computers as Weapons or help Weapons

Preview:

Citation preview

Computers andWEAPONS

Computersas Weaponsor help Weapons

Hacking,known as Cyber Weapon

A Cyber Weapon is•Mainly as hacking techniques•Viruses•Software used to penetrate networks•NOT ONLY in military, ALSO relating us

Computer Applied Weapons

Weapons that are•Conventional weapons•Computer controlled•New unmanned military vehicles, drones

History

Cyber Weapons•The 414s (1982)•6 teenagers raging from 16 to 22•60 high-profile computer systems•1st incident caused damage•1st arrest of hackers

Cyber Weapons•Markus Hess (1980s)•Recruited by the KGB•Attacked 400 U.S. military computers•Germany, Japan, MIT, OPTIMIS Database

Cyber Weapons•Routers with filtering rules(the late 1980s)•Packet filter firewalls (1988)•First commercial firewalls (1989-1994)•Circuit-level gateways (1989),2nd generation•Firewall Toolkit (FWTK)(1994),3rd generation

Computer Applied Weapons•New technologies, for military at first•AN/MYK-1 (MOBIDIC)(1959)•M18 FADAC (1960)•D-17B (1962)•D-37C (1964)

Computer Applied Weapons•UAV (Unmanned Aerial Vehicle)

•MAARS (Modular Advanced Armed Robotic System)

•Gun data computer

Problems for Society

Cyber Weapons•Will our information leak?• JP Morgan Chase: 76,000,000 (October, 2014)

•Apple Developer site: 275,000 (July, 2013)

•LinkedIn: 8,000,000 (June, 2012)

•US Military, National Guard and etc.

Cyber Weapons

•How severe is it?•Our safety is threatened

Computer Applied Weapons

•How to increase the efficiency?

Computer Applied Weapons

•How to reduce casualty?

Computer Applied Weapons

•How to protect bases?

Solutions

Cyber Weapons

•How can we defend?

Computer Applied Weapons•To increase the efficiency•Gun data computer•GOT & GOLIS systems by guidance computer

Computer Applied Weapons•To reduce casualty•UAV & MAARS•APS (Active protection system)

Computer Applied Weapons•To protect bases•Ballistic Missile Early Warning System

Will the Problem Change?

Cyber Weapons•Will the information leaking stop?•From the history to the present•Same in the future

Cyber Weapons•Why?•Attackers and defenders•Benefits

Computer Applied Weapons•How to increase the efficiency?•This never changes

Computer Applied Weapons•How to reduce casualty?•How to reduce the cost?

Computer Applied Weapons•How to protect bases?• In common sense, this never changes

References• What is a cyber weapon? (2011, June 28). Retrieved February 23, 2015, from

http://www.information-age.com/technology/security/1633383/what-is-a-cyber-weapon

• Darell, R. (2014, May 15). Hacking History - A Timeline Of Hack Tactics [Infographic]. Retrieved February 23, 2015.

• The 414s. (n.d.). Retrieved February 23, 2015, from http://en.wikipedia.org/wiki/The_414s

• Goodchild, J. (2012, May 14). 10 hacks that made headlines. Retrieved February 23, 2015.

• Drones, computers new weapons of U.S. shadow wars. (2012, June 17). Retrieved February 23, 2015.

• Firewalls.com, S. (n.d.). Internet Security. Retrieved February 23, 2015.

• Military computers. (n.d.). Retrieved February 23, 2015, from http://en.wikipedia.org/wiki/Military_computers

• MAARS. (n.d.). Retrieved February 23, 2015, from https://www.qinetiq-na.com/products/unmanned-systems/maars/

• Gun data computer. (n.d.). Retrieved February 23, 2015, from http://en.wikipedia.org/wiki/Gun_data_computer

• SILVER-GREENBERG, J., GOLDSTEIN, M., & PERLROTH, N. (2014, October 2). JPMorgan Chase Hacking Affects 76 Million Households. Retrieved February 23, 2015.

• Arthur, C. (2013, July 20). Apple Developer site hack: Turkish security researcher claims responsibility. Retrieved February 23, 2015.

• Goodin, D. (2012, June 6). 8 million leaked passwords connected to LinkedIn, dating website. Retrieved February 23, 2015.

• Missile guidance. (n.d.). Retrieved February 23, 2015, from http://en.wikipedia.org/wiki/Missile_guidance

Recommended