Computers andWEAPONS
Computersas Weaponsor help Weapons
Hacking,known as Cyber Weapon
A Cyber Weapon is•Mainly as hacking techniques•Viruses•Software used to penetrate networks•NOT ONLY in military, ALSO relating us
Computer Applied Weapons
Weapons that are•Conventional weapons•Computer controlled•New unmanned military vehicles, drones
History
Cyber Weapons•The 414s (1982)•6 teenagers raging from 16 to 22•60 high-profile computer systems•1st incident caused damage•1st arrest of hackers
Cyber Weapons•Markus Hess (1980s)•Recruited by the KGB•Attacked 400 U.S. military computers•Germany, Japan, MIT, OPTIMIS Database
Cyber Weapons•Routers with filtering rules(the late 1980s)•Packet filter firewalls (1988)•First commercial firewalls (1989-1994)•Circuit-level gateways (1989),2nd generation•Firewall Toolkit (FWTK)(1994),3rd generation
Computer Applied Weapons•New technologies, for military at first•AN/MYK-1 (MOBIDIC)(1959)•M18 FADAC (1960)•D-17B (1962)•D-37C (1964)
Computer Applied Weapons•UAV (Unmanned Aerial Vehicle)
•MAARS (Modular Advanced Armed Robotic System)
•Gun data computer
Problems for Society
Cyber Weapons•Will our information leak?• JP Morgan Chase: 76,000,000 (October, 2014)
•Apple Developer site: 275,000 (July, 2013)
•LinkedIn: 8,000,000 (June, 2012)
•US Military, National Guard and etc.
Cyber Weapons
•How severe is it?•Our safety is threatened
Computer Applied Weapons
•How to increase the efficiency?
Computer Applied Weapons
•How to reduce casualty?
Computer Applied Weapons
•How to protect bases?
Solutions
Cyber Weapons
•How can we defend?
Computer Applied Weapons•To increase the efficiency•Gun data computer•GOT & GOLIS systems by guidance computer
Computer Applied Weapons•To reduce casualty•UAV & MAARS•APS (Active protection system)
Computer Applied Weapons•To protect bases•Ballistic Missile Early Warning System
Will the Problem Change?
Cyber Weapons•Will the information leaking stop?•From the history to the present•Same in the future
Cyber Weapons•Why?•Attackers and defenders•Benefits
Computer Applied Weapons•How to increase the efficiency?•This never changes
Computer Applied Weapons•How to reduce casualty?•How to reduce the cost?
Computer Applied Weapons•How to protect bases?• In common sense, this never changes
References• What is a cyber weapon? (2011, June 28). Retrieved February 23, 2015, from
http://www.information-age.com/technology/security/1633383/what-is-a-cyber-weapon
• Darell, R. (2014, May 15). Hacking History - A Timeline Of Hack Tactics [Infographic]. Retrieved February 23, 2015.
• The 414s. (n.d.). Retrieved February 23, 2015, from http://en.wikipedia.org/wiki/The_414s
• Goodchild, J. (2012, May 14). 10 hacks that made headlines. Retrieved February 23, 2015.
• Drones, computers new weapons of U.S. shadow wars. (2012, June 17). Retrieved February 23, 2015.
• Firewalls.com, S. (n.d.). Internet Security. Retrieved February 23, 2015.
• Military computers. (n.d.). Retrieved February 23, 2015, from http://en.wikipedia.org/wiki/Military_computers
• MAARS. (n.d.). Retrieved February 23, 2015, from https://www.qinetiq-na.com/products/unmanned-systems/maars/
• Gun data computer. (n.d.). Retrieved February 23, 2015, from http://en.wikipedia.org/wiki/Gun_data_computer
• SILVER-GREENBERG, J., GOLDSTEIN, M., & PERLROTH, N. (2014, October 2). JPMorgan Chase Hacking Affects 76 Million Households. Retrieved February 23, 2015.
• Arthur, C. (2013, July 20). Apple Developer site hack: Turkish security researcher claims responsibility. Retrieved February 23, 2015.
• Goodin, D. (2012, June 6). 8 million leaked passwords connected to LinkedIn, dating website. Retrieved February 23, 2015.
• Missile guidance. (n.d.). Retrieved February 23, 2015, from http://en.wikipedia.org/wiki/Missile_guidance