Cybergeddon
Cybergeddon (from tech. cyber-, lit. "computer"; Hebrew: Megiddo, extracted from Har Megiddo ("mountain of final battle")) refers to cataclysm resulting from a large-scale sabotage of all computerized networks, systems and activities. It combines cyberterrorism, cyberwarfare, cybercrime, and hacktivism into scenarios of wide-scale internet disruption or economic collapse.[1] Economic or industrial infrastructure could be targeted, such as banks[2] or industrial control systems.[3] Since 2012, the number of Internet-based attacks and their complexity has increased.[4]
"Cybergeddon is a possibility," FireEye CEO Ashar Aziz explained in an interview with Bloomberg: "Attacks on critical infrastructures such as the power grid or financial institutions could wreak havoc not just on United States economy, but in fact, the world economy."[5]
The Defense Technical Information Center cited nuclear electromagnetic pulse attacks as a part of the military action that may bring about cybergeddon.[6]
References
- ^ Goodwin, Bill (2014-01-17). "Internet at risk of 'cybergeddon' says WEF". Computer Weekly. Retrieved 2014-07-07.
- ^ Marks, Paul (2012-06-25). "Banking outage gives tiny glimpse of cybergeddon". New Scientist. Retrieved 2014-07-07.
- ^ Chirgwin, Richard (2012-11-12). "New report warns of SCADA CYBERGEDDON*". The Register. Retrieved 2014-07-07.
- ^ "Keeping 'Cybergeddon' at bay". Business Spectator. 2012-10-31. Retrieved 2014-07-07.
- ^ "FireEye CEO Says 'Cybergeddon' Is a Possiblity [sic]: Video". Bloomberg. 2011-06-24. Retrieved 2012-11-22.
- ^ Pry, Peter (2017-07-27). "Nuclear EMP Attack Scenarios and Combined-Arms Cyber Warfare". Defense Technical Information Center. Archived from the original on March 17, 2021. Retrieved 2022-01-05.
- v
- t
- e
- Computer security
- Automotive security
- Cybercrime
- Cybergeddon
- Cyberterrorism
- Cyberwarfare
- Electromagnetic warfare
- Information warfare
- Internet security
- Mobile security
- Network security
- Copy protection
- Digital rights management
- Adware
- Advanced persistent threat
- Arbitrary code execution
- Backdoors
- Hardware backdoors
- Code injection
- Crimeware
- Cross-site scripting
- Cross-site leaks
- DOM clobbering
- History sniffing
- Cryptojacking
- Botnets
- Data breach
- Drive-by download
- Browser Helper Objects
- Viruses
- Data scraping
- Denial-of-service attack
- Eavesdropping
- Email fraud
- Email spoofing
- Exploits
- Hacktivism
- Insecure direct object reference
- Keystroke loggers
- Logic bombs
- Time bombs
- Fork bombs
- Zip bombs
- Fraudulent dialers
- Malware
- Payload
- Phishing
- Polymorphic engine
- Privilege escalation
- Ransomware
- Rootkits
- Scareware
- Shellcode
- Spamming
- Social engineering
- Spyware
- Software bugs
- Trojan horses
- Hardware Trojans
- Remote access trojans
- Vulnerability
- Web shells
- Wiper
- Worms
- SQL injection
- Rogue security software
- Zombie