Download presentation
Presentation is loading. Please wait.
Published byLaureen Eleanor Henry Modified over 9 years ago
1
Computers and WEAPONS
2
Computers as Weapons or help Weapons
3
Hacking, known as Cyber Weapon
4
A Cyber Weapon is Mainly as hacking techniques Viruses Software used to penetrate networks NOT ONLY in military, ALSO relating us
5
Computer Applied Weapons
6
Weapons that are Conventional weapons Computer controlled New unmanned military vehicles, drones
7
History
8
Cyber Weapons The 414s (1982) 6 teenagers raging from 16 to 22 60 high-profile computer systems 1 st incident caused damage 1 st arrest of hackers
9
Cyber Weapons Markus Hess (1980s) Recruited by the KGB Attacked 400 U.S. military computers Germany, Japan, MIT, OPTIMIS Database
10
Cyber Weapons Routers with filtering rules (the late 1980s) Packet filter firewalls (1988) First commercial firewalls (1989-1994) Circuit-level gateways (1989), 2 nd generation Firewall Toolkit (FWTK)(1994), 3 rd generation
11
Computer Applied Weapons New technologies, for military at first AN/MYK-1 (MOBIDIC) (1959) M18 FADAC (1960) D-17B (1962) D-37C (1964)
12
Computer Applied Weapons UAV (Unmanned Aerial Vehicle) MAARS (Modular Advanced Armed Robotic System) Gun data computer
13
Problems for Society
14
Cyber Weapons Will our information leak? JP Morgan Chase: 76,000,000 (October, 2014) Apple Developer site: 275,000 (July, 2013) LinkedIn: 8,000,000 (June, 2012) US Military, National Guard and etc.
15
Cyber Weapons How severe is it? Our safety is threatened
16
Computer Applied Weapons How to increase the efficiency?
17
Computer Applied Weapons How to reduce casualty?
18
Computer Applied Weapons How to protect bases?
19
Solutions
20
Cyber Weapons How can we defend?
21
Computer Applied Weapons To increase the efficiency Gun data computer GOT & GOLIS systems by guidance computer
22
Computer Applied Weapons To reduce casualty UAV & MAARS APS (Active protection system)
23
Computer Applied Weapons To protect bases Ballistic Missile Early Warning System
24
Will the Problem Change?
25
Cyber Weapons Will the information leaking stop? From the history to the present Same in the future
26
Cyber Weapons Why? Attackers and defenders Benefits
27
Computer Applied Weapons How to increase the efficiency? This never changes
28
Computer Applied Weapons How to reduce casualty? How to reduce the cost?
29
Computer Applied Weapons How to protect bases? In common sense, this never changes
30
References What is a cyber weapon? (2011, June 28). Retrieved February 23, 2015, from http://www.information- age.com/technology/security/1633383/what-is-a-cyber-weapon Darell, R. (2014, May 15). Hacking History - A Timeline Of Hack Tactics [Infographic]. Retrieved February 23, 2015. The 414s. (n.d.). Retrieved February 23, 2015, from http://en.wikipedia.org/wiki/The_414s Goodchild, J. (2012, May 14). 10 hacks that made headlines. Retrieved February 23, 2015. Drones, computers new weapons of U.S. shadow wars. (2012, June 17). Retrieved February 23, 2015. Firewalls.com, S. (n.d.). Internet Security. Retrieved February 23, 2015. Military computers. (n.d.). Retrieved February 23, 2015, from http://en.wikipedia.org/wiki/Military_computers MAARS. (n.d.). Retrieved February 23, 2015, from https://www.qinetiq-na.com/products/unmanned-systems/maars/ Gun data computer. (n.d.). Retrieved February 23, 2015, from http://en.wikipedia.org/wiki/Gun_data_computer SILVER-GREENBERG, J., GOLDSTEIN, M., & PERLROTH, N. (2014, October 2). JPMorgan Chase Hacking Affects 76 Million Households. Retrieved February 23, 2015. Arthur, C. (2013, July 20). Apple Developer site hack: Turkish security researcher claims responsibility. Retrieved February 23, 2015. Goodin, D. (2012, June 6). 8 million leaked passwords connected to LinkedIn, dating website. Retrieved February 23, 2015. Missile guidance. (n.d.). Retrieved February 23, 2015, from http://en.wikipedia.org/wiki/Missile_guidance
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.