In hacktivism and cyber-warfare, critical information, assets and infrastructure are attacked, disrupted or compromised in an effort to conduct espionage, or to sabotage or destabilize the political or military efforts of a nation or state.
With the developed world’s reliance on electronic data transmission and complex computer systems that control everything from water purification to global financial oversight, the damage that can be caused by cyber attacks is immeasurable. The scope and scale of these potential vulnerabilities is matched by the speed with which many of these systems could be disabled or disrupted, making the protection of our electronic and digital data and systems a significant global priority.
In 2010, the STUXNET worm compromised computer system controls that were used to enrich Uranium and, in turn, reportedly destroyed nearly 1,000 centrifuges. In 2012, the SHAMOON worm, believed to be a copycat of STUXNET, did more than just compromise these computer systems – it destroyed more than 30,000 of them, making it one of the largest attacks on a private sector system in history.
These attacks reinforce the intention to cause physical destruction by virtual means, resulting in significant financial cost. As a direct result of cyber attacks, the United States has been forced to close two nuclear plants, costing $1 million per day to divert power from other parts of the energy grid.
Our comprehensive training explores the causes and effects of hacktivism and cyber-warfare at local, domestic and international levels, and provides comprehensive instruction on the detection and identification of system vulnerabilities, and the isolation, monitoring and disruption of cyber attacks on critical information systems.