Cyber Arms; Security in Cyberspace by Stanislav Abaimov; Maurizio Martellini
Author:Stanislav Abaimov; Maurizio Martellini
Language: eng
Format: epub
Publisher: CRC Press
Published: 2020-07-13T16:00:00+00:00
2.5.2 Vulnerabilities of Nuclear Weapon Systems and N3C
Today’s NSA secrets become tomorrow’s Ph.D. theses and the next day’s hacker tools
Bruce Schneier
Nuclear Weapons Overview
Nuclear weapons, enhanced by computerized systems, are becoming more dependent on virtual intelligence. Though ensuring the greatest deterrence of all time, with their increased complexity and embedded cyber equipment, they have become vulnerable to stealthy, high speed, unpredictable and anonymous cyberattacks and have expanded the range of attack vectors.
Nuclear weapon means any weapon that derives its destructive force from nuclear reactions. The nuclear reaction may either be fission or a combination of fission and fusion. Nuclear weapons are considered weapons of mass destruction.72
72 Nuclear Weapon Law and Legal Definition, last retrieved on 9 December 2018 at https://definitions.uslegal.com/n/nuclear-weapon/
Cyberattacks on the Nuclear Command, Control, and Communications (NC3) systems could cause false alarms, interrupt critical communications, interfere with the delivery systems, or even lead to full control of a nuclear weapon, targeted launch or detonation within the silo.
It is widely believed that the nuclear systems have the safest design and highest level of protection. However, the human factor remains present and human errors and unauthorized use with the systems, neither can be excluded with errors in design, calculations or equipment failures. Even previously secure air-gapped solutions are no longer the guarantee of protection from cyberattacks.73
73 S. Abaimov and P. Ingram, Hacking UK Trident: The Growing Threat, British-American Security Information Council 2017
There are a number of vulnerabilities and pathways through which a malicious actor may infiltrate a nuclear weapons system without a state’s knowledge. Human error, system failures, design vulnerabilities, and susceptibilities within the supply chain all represent common security issues in nuclear weapons systems. Cyberattack methods such as data manipulation, digital jamming and cyber spoofing could jeopardize the integrity of communication, leading to increased uncertainty in decision-making.74
74 Cybersecurity of Nuclear Weapons Systems Threats, Vulnerabilities and Consequences, Beyza Unal and Patricia Lewis, January 2018, International Security Department, Chatham House, last retrieved on 2 August 2018 at https://www.chathamhouse.org/sites/default/files/publications/research/2018-01-11-cybersecurity-nuclear-weapons-unal-lewis-final.pdf
Cybersecurity of Nuclear Weapons Systems Threats, Vulnerabilities and Consequences, Beyza Unal and Patricia Lewis, Chatham House, 2018
Recognizing the need of the nuclear systems for peaceful purposes, existence and the continuing production of nuclear weapons and their support equipment for military deterrence, the issue of their protection from sophisticated cyber threats is becoming one of paramount importance.
Hackers are targeting nuclear facilities, homeland security dept. and F.B.I. say75
75 N. Perlroth, Hackers are targeting nuclear facilities, 6 July 2017, last retrieved on 1 June 2018 at https://www.nytimes.com/2017/07/06/technology/nuclear-plant-hack-report.html?_r=0
Since May 2017, hackers have been penetrating the computer networks of companies that operate nuclear power stations and other energy facilities, as well as manufacturing plants in the United States and other countries.
Among the companies targeted was the Wolf Creek Nuclear Operating Corporation, which runs a nuclear power plant near Burlington, Kan., according to security consultants and an urgent joint report issued by the Department of Homeland Security and the Federal Bureau of Investigation last week.
Information about cyberattacks on nuclear systems is very sensitive and mostly classified, and not available openly. However, it
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Future Crimes by Marc Goodman(3002)
Mastering Python for Networking and Security by José Manuel Ortega(2951)
Blockchain Basics by Daniel Drescher(2891)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2511)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2483)
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(2357)
The Art Of Deception by Kevin Mitnick(2297)
Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(2212)
The Code Book by Simon Singh(2209)
Machine Learning Security Principles by John Paul Mueller(1911)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(1900)
Wireless Hacking 101 by Karina Astudillo(1848)
DarkMarket by Misha Glenny(1847)
Hands-On AWS Penetration Testing with Kali Linux by Benjamin Caudill & Karl Gilbert(1842)
Applied Network Security by Arthur Salmon & Michael McLafferty & Warun Levesque(1839)
Mobile Forensics Cookbook by Igor Mikhaylov(1814)
Serious Cryptography: A Practical Introduction to Modern Encryption by Aumasson Jean-Philippe(1806)
Solidity Programming Essentials by Ritesh Modi(1794)
Bulletproof Android: Practical Advice for Building Secure Apps (Developer's Library) by Godfrey Nolan(1671)