Cybergeddon
Cybergeddon (from tech. cyber-, lit. "computer"; Hebrew: Megiddo, extracted from Har Megiddo ("mountain of final battle")) refers to cataclysm resulting from a large-scale sabotage of all computerized networks, systems and activities. It combines cyberterrorism, cyberwarfare, cybercrime, and hacktivism into scenarios of wide-scale internet disruption or economic collapse.[1] Economic or industrial infrastructure could be targeted, such as banks[2] or industrial control systems.[3] Since 2012, the number of Internet-based attacks and their complexity has increased.[4]
"Cybergeddon is a possibility," FireEye CEO Ashar Aziz explained in an interview with Bloomberg: "Attacks on critical infrastructures such as the power grid or financial institutions could wreak havoc not just on United States economy, but in fact, the world economy."[5]
The Defense Technical Information Center cited nuclear electromagnetic pulse attacks as a part of the military action that may bring about cybergeddon.[6]
References
- ↑ Goodwin, Bill (2014-01-17). "Internet at risk of 'cybergeddon' says WEF". Computer Weekly. http://www.computerweekly.com/news/2240212690/Internet-at-risk-of-cybergeddon-says-WEF.
- ↑ Marks, Paul (2012-06-25). "Banking outage gives tiny glimpse of cybergeddon". New Scientist. https://www.newscientist.com/blogs/onepercent/2012/06/banking-outage-gives-tiny-glim.html.
- ↑ Chirgwin, Richard (2012-11-12). "New report warns of SCADA CYBERGEDDON*". The Register. https://www.theregister.co.uk/2012/11/12/scada_vulnerability_study/.
- ↑ "Keeping 'Cybergeddon' at bay". Business Spectator. 2012-10-31. http://www.businessspectator.com.au/article/2012/10/31/technology/keeping-cybergeddon-bay.
- ↑ "FireEye CEO Says 'Cybergeddon' Is a Possiblity [sic]: Video". Bloomberg. 2011-06-24. https://www.bloomberg.com/video/71431086/.
- ↑ Pry, Peter (2017-07-27). "Nuclear EMP Attack Scenarios and Combined-Arms Cyber Warfare". Defense Technical Information Center. https://apps.dtic.mil/sti/citations/AD1097009. Retrieved 2022-01-05.
This article is part of a series on |
Information security |
---|
Related security categories |
Threats |
Defenses |
Original source: https://en.wikipedia.org/wiki/Cybergeddon.
Read more |