Computers and WEAPONS
Computers as Weapons or help Weapons
Hacking, known as Cyber Weapon
A Cyber Weapon is Mainly as hacking techniques Viruses Software used to penetrate networks NOT ONLY in military, ALSO relating us
Computer Applied Weapons
Weapons that are Conventional weapons Computer controlled New unmanned military vehicles, drones
History
Cyber Weapons The 414s (1982) 6 teenagers raging from 16 to high-profile computer systems 1 st incident caused damage 1 st arrest of hackers
Cyber Weapons Markus Hess (1980s) Recruited by the KGB Attacked 400 U.S. military computers Germany, Japan, MIT, OPTIMIS Database
Cyber Weapons Routers with filtering rules (the late 1980s) Packet filter firewalls (1988) First commercial firewalls ( ) Circuit-level gateways (1989), 2 nd generation Firewall Toolkit (FWTK)(1994), 3 rd generation
Computer Applied Weapons New technologies, for military at first AN/MYK-1 (MOBIDIC) (1959) M18 FADAC (1960) D-17B (1962) D-37C (1964)
Computer Applied Weapons UAV (Unmanned Aerial Vehicle) MAARS (Modular Advanced Armed Robotic System) Gun data computer
Problems for Society
Cyber Weapons Will our information leak? JP Morgan Chase: 76,000,000 (October, 2014) Apple Developer site: 275,000 (July, 2013) LinkedIn: 8,000,000 (June, 2012) US Military, National Guard and etc.
Cyber Weapons How severe is it? Our safety is threatened
Computer Applied Weapons How to increase the efficiency?
Computer Applied Weapons How to reduce casualty?
Computer Applied Weapons How to protect bases?
Solutions
Cyber Weapons How can we defend?
Computer Applied Weapons To increase the efficiency Gun data computer GOT & GOLIS systems by guidance computer
Computer Applied Weapons To reduce casualty UAV & MAARS APS (Active protection system)
Computer Applied Weapons To protect bases Ballistic Missile Early Warning System
Will the Problem Change?
Cyber Weapons Will the information leaking stop? From the history to the present Same in the future
Cyber Weapons Why? Attackers and defenders Benefits
Computer Applied Weapons How to increase the efficiency? This never changes
Computer Applied Weapons How to reduce casualty? How to reduce the cost?
Computer Applied Weapons How to protect bases? In common sense, this never changes
References What is a cyber weapon? (2011, June 28). Retrieved February 23, 2015, from age.com/technology/security/ /what-is-a-cyber-weapon Darell, R. (2014, May 15). Hacking History - A Timeline Of Hack Tactics [Infographic]. Retrieved February 23, The 414s. (n.d.). Retrieved February 23, 2015, from Goodchild, J. (2012, May 14). 10 hacks that made headlines. Retrieved February 23, Drones, computers new weapons of U.S. shadow wars. (2012, June 17). Retrieved February 23, Firewalls.com, S. (n.d.). Internet Security. Retrieved February 23, Military computers. (n.d.). Retrieved February 23, 2015, from MAARS. (n.d.). Retrieved February 23, 2015, from Gun data computer. (n.d.). Retrieved February 23, 2015, from SILVER-GREENBERG, J., GOLDSTEIN, M., & PERLROTH, N. (2014, October 2). JPMorgan Chase Hacking Affects 76 Million Households. Retrieved February 23, Arthur, C. (2013, July 20). Apple Developer site hack: Turkish security researcher claims responsibility. Retrieved February 23, Goodin, D. (2012, June 6). 8 million leaked passwords connected to LinkedIn, dating website. Retrieved February 23, Missile guidance. (n.d.). Retrieved February 23, 2015, from