1Brief Review of Cyber Incidents
When it comes to national security, I think this [i.e., cyber warfare] represents the battleground for the future. I’ve often said that I think the potential for the next Pearl Harbor could very well be a cyber‐attack. If you have a cyber‐attack that brings down our power grid system, brings down our financial systems, brings down our government systems, you could paralyze this country.1
Leon Panetta
The 1988 Morris Worm, designed to estimate the size of the Internet, caused the shutting down of thousands of machines and resulted in the Defense Advanced Research Projects Agency (DARPA) funding the first Computer Emergency Response Team (CERT) at Carnegie Mellon University (CMU). As shown in Table 1.1, cyberattacks have continued since 1988, with effects that range from data collection to controlling critical infrastructure.
Table 1.1 Select cyber incidents.
Year | Cyberattack | Objective | Effects |
1988 | Morris Worm | Understand the number of hosts connected to the Internet | Removed thousands of computers from operation |
2003 | Slammer Worm | Denial of service | Disabled Ohio's Davis–Besse nuclear power plant safety monitoring system for nearly 5 h |
2008 | Conficker | Implant malware on target machines | Control target machines |
2010 | STUXNET | Take control of Siemens industrial control systems (ICS’) | Destroyed centrifuges used for Iranian nuclear program |
2012 | Saudi Aramco (oil provider) business systems (aka Al Shamoon) | Wipe disks on Microsoft Windows‐based ... |
Get An Introduction to Cyber Modeling and Simulation now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.