Difference between revisions of "Cyberattack"

From Wikispooks
Jump to navigation Jump to search
m (lede switch, spell)
 
(4 intermediate revisions by the same user not shown)
Line 1: Line 1:
 
{{concept
 
{{concept
|wikipedia=
+
|wikipedia=https://en.wikipedia.org/wiki/Cyberattack
 
|constitutes=Disaster
 
|constitutes=Disaster
 
|interests=
 
|interests=
Line 7: Line 7:
 
}}
 
}}
 
''Cyberattack'' may refer to nation states as [[Cyberwarfare]] or to individuals as [[Cyberterrorism]]''
 
''Cyberattack'' may refer to nation states as [[Cyberwarfare]] or to individuals as [[Cyberterrorism]]''
 
  
 
'''Cyberattacks''' are digital attacks on [[computer]] information systems, computer networks, infrastructures, or personal computer devices, using the internet or a mechanical device.<ref>https://en.wikipedia.org/wiki/Cyberattack</ref>
 
'''Cyberattacks''' are digital attacks on [[computer]] information systems, computer networks, infrastructures, or personal computer devices, using the internet or a mechanical device.<ref>https://en.wikipedia.org/wiki/Cyberattack</ref>
Line 18: Line 17:
  
 
==Official narrative==
 
==Official narrative==
We are too stupid to write our own code and must therefore rely on third party software produced by (foreign) intelligence-connected companies. We are also too stupid to avoid basic errors in system administration. This is so horrible that the financial system might collapse soon!
+
{{YouTubeVideo
 +
|code=fUeJtM1bgGo
 +
|align=left
 +
|width=
 +
|caption=Top 10 Cyber Attacks In History - Simplilearn
 +
}}
 +
 
 +
We are too stupid to write our own code and must therefore rely on third party software produced by (foreign) intelligence-connected companies. We are also too stupid to avoid basic errors in system administration. This is so horrible that the financial system might collapse soon!
  
 
==Problems==
 
==Problems==
Line 29: Line 35:
 
==References==
 
==References==
 
{{reflist}}
 
{{reflist}}
{{Stub}}
 

Latest revision as of 22:50, 9 February 2024

Concept.png "Cyberattack" 
(“Disaster”)Rdf-entity.pngRdf-icon.png
Subpage(s)Cyberattack/Preparation
Cyberattacks are a new form of large scale security holes, which suspiciously emerge from an (unknown) central point in government software all over the world

Cyberattack may refer to nation states as Cyberwarfare or to individuals as Cyberterrorism

Cyberattacks are digital attacks on computer information systems, computer networks, infrastructures, or personal computer devices, using the internet or a mechanical device.[1]

Preparations

Full article: Stub class article Cyberattack/Preparation

China might be accused of a “Cyberattack” (i.e. chips, power grip, supply chain, etc.) planning exercises suggest in their "computer simulations".[2]

Official narrative

Top 10 Cyber Attacks In History - Simplilearn

We are too stupid to write our own code and must therefore rely on third party software produced by (foreign) intelligence-connected companies. We are also too stupid to avoid basic errors in system administration. This is so horrible that the financial system might collapse soon!

Problems

The backdoors are deliberately placed pieces of malware, typically (SolarWinds) from a central untrustworthy origin. I.e. not buffer overflows or systemic, or hardware vulnerabilities. This poses the question: at which level and with which security clearances are these higher-up developers controlled and monitored? These are developers above the nation state level.[3] There is no plausible reason why governments would not be able to audit crucial software themselves or why they should trust private companies.


Many thanks to our Patrons who cover ~2/3 of our hosting bill. Please join them if you can.


References