Gartner: Dependence On Internet Boosts Risks of Cyberwar - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Infrastructure

Gartner: Dependence On Internet Boosts Risks of Cyberwar

The research firm says that the rate of adoption of Internet-based technology means that nations will have the ability to conduct cyberwarfare by 2005.

Dependence on the Internet for voice communications and data distribution will increase the likelihood of cyberwarfare, a high-tech research firm said Thursday.

Much like the nuclear threat during the Cold War, cyberwarfare is a potential catastrophe that the United States and other nations must be prepared to combat, Gartner said. Given the rate of adoption of Internet-based technology, nations will have the ability to conduct cyberwarfare by 2005.

"The world's not going to hell in a hand basket, so we can get that off the table," said David Fraley, author of the recent Gartner report. "What's important for people to do is continuity planning--be aware of the different threats and vulnerabilities that could hit their organizations."

Organizations could suffer irreparable harm if they don't have a strategy for keeping their businesses running, if facilities are unable to operate.

"The difference between cyberwarfare and hacking is the magnitude," Fraley said. "Cyberwarfare is on a much grander scale."

Increasing the possibility is the ever-increasing use of IP networking technology to connect critical infrastructure, as well as the movement in voice communications from a circuit- to packet-switched architecture, the research firm said.

IP networks carrying voice traffic use voice over IP equipment that is susceptible to traditional Internet threats like worms, viruses and break-ins from hackers. For example, denial-of-service attacks that often take down Web sites could be used to disrupt the flow of voice-carrying packets on an IP network, causing a major breakdown in communications.

On the infrastructure level, interfaces allowing maintenance and control of equipment have traditionally been accessed through dial-up modems. As more of these access points are converted to IP network connections, the vulnerability to attack also increases.

Possible targets of attacks include network interfaces found in equipment used by dams, railroads, electrical grids and power generation facilities, Gartner said. Another target is the interface points between SS7, the central nervous system of the public switched telephone network, and IP networks. Gartner predicts that SS7 will become a key communications target by 2006.

Other trends adding to the potential destruction of cyber-attacks include the conversion of traditional frame relay and X.25 protocols used to connect computer systems in banking and finance to IP networking. Similar conversions are taking place in other industries, such as chemical, oil and gas, electrical, law enforcement, and rail transportation.

In its research, Gartner points out businesses can find ways to manage risk through the U.S. National Infrastructure Protection Center, which has published a document entitled, "Risk Management: An Essential Guide to Protecting Critical Assets."

"Most security technology, when used in conjunction with 'best practices,' is appropriate to the proportional risk presented by the threat of cyberwarfare," Gartner said in a statement. "The proportional-risk assumption does not mean that a cyberwarfare attack would be unsuccessful if undertaken by a determined foe, but that risk is low."

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Commentary
Gartner Forecast Sees 7.3% Shrinkage in IT Spending for 2020
Joao-Pierre S. Ruth, Senior Writer,  7/15/2020
Slideshows
10 Ways AI Is Transforming Enterprise Software
Cynthia Harvey, Freelance Journalist, InformationWeek,  7/13/2020
Commentary
IT Career Paths You May Not Have Considered
Lisa Morgan, Freelance Writer,  6/30/2020
White Papers
Register for InformationWeek Newsletters
The State of IT & Cybersecurity Operations 2020
The State of IT & Cybersecurity Operations 2020
Download this report from InformationWeek, in partnership with Dark Reading, to learn more about how today's IT operations teams work with cybersecurity operations, what technologies they are using, and how they communicate and share responsibility--or create risk by failing to do so. Get it now!
Video
Current Issue
Key to Cloud Success: The Right Management
This IT Trend highlights some of the steps IT teams can take to keep their cloud environments running in a safe, efficient manner.
Slideshows
Flash Poll