30
Computers and WEAPONS

Computers and WEAPONS. Computers as Weapons or help Weapons

Embed Size (px)

Citation preview

Page 1: Computers and WEAPONS. Computers as Weapons or help Weapons

Computers andWEAPONS

Page 2: Computers and WEAPONS. Computers as Weapons or help Weapons

Computersas Weaponsor help Weapons

Page 3: Computers and WEAPONS. Computers as Weapons or help Weapons

Hacking,known as Cyber Weapon

Page 4: Computers and WEAPONS. Computers as Weapons or help Weapons

A Cyber Weapon is•Mainly as hacking techniques•Viruses•Software used to penetrate networks•NOT ONLY in military, ALSO relating us

Page 5: Computers and WEAPONS. Computers as Weapons or help Weapons

Computer Applied Weapons

Page 6: Computers and WEAPONS. Computers as Weapons or help Weapons

Weapons that are•Conventional weapons•Computer controlled•New unmanned military vehicles, drones

Page 7: Computers and WEAPONS. Computers as Weapons or help Weapons

History

Page 8: Computers and WEAPONS. Computers as Weapons or help Weapons

Cyber Weapons•The 414s (1982)•6 teenagers raging from 16 to 22•60 high-profile computer systems•1st incident caused damage•1st arrest of hackers

Page 9: Computers and WEAPONS. Computers as Weapons or help Weapons

Cyber Weapons•Markus Hess (1980s)•Recruited by the KGB•Attacked 400 U.S. military computers•Germany, Japan, MIT, OPTIMIS Database

Page 10: Computers and WEAPONS. Computers as Weapons or help Weapons

Cyber Weapons•Routers with filtering rules(the late 1980s)•Packet filter firewalls (1988)•First commercial firewalls (1989-1994)•Circuit-level gateways (1989),2nd generation•Firewall Toolkit (FWTK)(1994),3rd generation

Page 11: Computers and WEAPONS. Computers as Weapons or help Weapons

Computer Applied Weapons•New technologies, for military at first•AN/MYK-1 (MOBIDIC)(1959)•M18 FADAC (1960)•D-17B (1962)•D-37C (1964)

Page 12: Computers and WEAPONS. Computers as Weapons or help Weapons

Computer Applied Weapons•UAV (Unmanned Aerial Vehicle)

•MAARS (Modular Advanced Armed Robotic System)

•Gun data computer

Page 13: Computers and WEAPONS. Computers as Weapons or help Weapons

Problems for Society

Page 14: Computers and WEAPONS. Computers as Weapons or help Weapons

Cyber Weapons•Will our information leak?• JP Morgan Chase: 76,000,000 (October, 2014)

•Apple Developer site: 275,000 (July, 2013)

•LinkedIn: 8,000,000 (June, 2012)

•US Military, National Guard and etc.

Page 15: Computers and WEAPONS. Computers as Weapons or help Weapons

Cyber Weapons

•How severe is it?•Our safety is threatened

Page 16: Computers and WEAPONS. Computers as Weapons or help Weapons

Computer Applied Weapons

•How to increase the efficiency?

Page 17: Computers and WEAPONS. Computers as Weapons or help Weapons

Computer Applied Weapons

•How to reduce casualty?

Page 18: Computers and WEAPONS. Computers as Weapons or help Weapons

Computer Applied Weapons

•How to protect bases?

Page 19: Computers and WEAPONS. Computers as Weapons or help Weapons

Solutions

Page 20: Computers and WEAPONS. Computers as Weapons or help Weapons

Cyber Weapons

•How can we defend?

Page 21: Computers and WEAPONS. Computers as Weapons or help Weapons

Computer Applied Weapons•To increase the efficiency•Gun data computer•GOT & GOLIS systems by guidance computer

Page 22: Computers and WEAPONS. Computers as Weapons or help Weapons

Computer Applied Weapons•To reduce casualty•UAV & MAARS•APS (Active protection system)

Page 23: Computers and WEAPONS. Computers as Weapons or help Weapons

Computer Applied Weapons•To protect bases•Ballistic Missile Early Warning System

Page 24: Computers and WEAPONS. Computers as Weapons or help Weapons

Will the Problem Change?

Page 25: Computers and WEAPONS. Computers as Weapons or help Weapons

Cyber Weapons•Will the information leaking stop?•From the history to the present•Same in the future

Page 26: Computers and WEAPONS. Computers as Weapons or help Weapons

Cyber Weapons•Why?•Attackers and defenders•Benefits

Page 27: Computers and WEAPONS. Computers as Weapons or help Weapons

Computer Applied Weapons•How to increase the efficiency?•This never changes

Page 28: Computers and WEAPONS. Computers as Weapons or help Weapons

Computer Applied Weapons•How to reduce casualty?•How to reduce the cost?

Page 29: Computers and WEAPONS. Computers as Weapons or help Weapons

Computer Applied Weapons•How to protect bases?• In common sense, this never changes

Page 30: Computers and WEAPONS. Computers as Weapons or help Weapons

References• What is a cyber weapon? (2011, June 28). Retrieved February 23, 2015, from

http://www.information-age.com/technology/security/1633383/what-is-a-cyber-weapon

• Darell, R. (2014, May 15). Hacking History - A Timeline Of Hack Tactics [Infographic]. Retrieved February 23, 2015.

• The 414s. (n.d.). Retrieved February 23, 2015, from http://en.wikipedia.org/wiki/The_414s

• Goodchild, J. (2012, May 14). 10 hacks that made headlines. Retrieved February 23, 2015.

• Drones, computers new weapons of U.S. shadow wars. (2012, June 17). Retrieved February 23, 2015.

• Firewalls.com, S. (n.d.). Internet Security. Retrieved February 23, 2015.

• Military computers. (n.d.). Retrieved February 23, 2015, from http://en.wikipedia.org/wiki/Military_computers

• MAARS. (n.d.). Retrieved February 23, 2015, from https://www.qinetiq-na.com/products/unmanned-systems/maars/

• Gun data computer. (n.d.). Retrieved February 23, 2015, from http://en.wikipedia.org/wiki/Gun_data_computer

• SILVER-GREENBERG, J., GOLDSTEIN, M., & PERLROTH, N. (2014, October 2). JPMorgan Chase Hacking Affects 76 Million Households. Retrieved February 23, 2015.

• Arthur, C. (2013, July 20). Apple Developer site hack: Turkish security researcher claims responsibility. Retrieved February 23, 2015.

• Goodin, D. (2012, June 6). 8 million leaked passwords connected to LinkedIn, dating website. Retrieved February 23, 2015.

• Missile guidance. (n.d.). Retrieved February 23, 2015, from http://en.wikipedia.org/wiki/Missile_guidance