{"id":760,"date":"2024-04-11T12:52:12","date_gmt":"2024-04-11T16:52:12","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/?p=760"},"modified":"2024-04-11T12:52:12","modified_gmt":"2024-04-11T16:52:12","slug":"module-13-watch-this-video-on-cyber-warfare-is-everywhere-he-explains-how-human-warfare-evolved-through-the-ages-and-how-cyberwarfare-is-a-culmination-of-it-all-something-new-he-t","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/2024\/04\/11\/module-13-watch-this-video-on-cyber-warfare-is-everywhere-he-explains-how-human-warfare-evolved-through-the-ages-and-how-cyberwarfare-is-a-culmination-of-it-all-something-new-he-t\/","title":{"rendered":"Module 13: Watch this video on \u201cCyber warfare is everywhere\u201d. He explains how human warfare evolved through the ages and how cyberwarfare is a culmination of it all. Something new he talks about is the concept of \u201cKinetic Cyberwarfare\u201d and provided \u201cStuxnet\u201d as an example. Research on other examples and provide your feedback."},"content":{"rendered":"\n<figure class=\"wp-block-embed is-type-video is-provider-ted wp-block-embed-ted wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Brijesh Singh: Brijesh Singh: Cyber warfare is everywhere\" src=\"https:\/\/embed.ted.com\/talks\/brijesh_singh_brijesh_singh_cyber_warfare_is_everywhere\" width=\"676\" height=\"381\" frameborder=\"0\" scrolling=\"no\" webkitAllowFullScreen mozallowfullscreen allowFullScreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p>The definition of Kinetic Cyberwarfare is when someone causes direct or indirect harm such as injury or damage to a crucial system through vulnerabilities. This concept has already happened to hospitals, power plants, and even oil companies. An example other than Stuxnet can be the attack Russia used against Ukraine. Russia intended to disarm and disrupt as many of Ukraine&#8217;s systems and infrastructure as possible. The attack extended across multiple sources such as finance, government campaigns, power, etc.&nbsp;<\/p>\n\n\n\n<p>Cyberspace is where many essentials exist or where physical necessities rely on usage. Powerplants are mostly automated and can be controlled and monitored. The article written by Lewis on the Russia vs. Ukraine cyber war makes a statement I believe perfectly sums up the severity of cyber wars. &#8220;When a missile destroys a power plant, the smoking rubble can be observed. It is more difficult to tell if a cyberattack has succeeded or how permanent the effect will be. (Lewis, 2022)&#8221;<\/p>\n\n\n\n<p><strong>Resources:<\/strong><\/p>\n\n\n\n<p>Goud, N. (2018, January 2). <em>What is a Cyber Kinetic Attack? &#8211; Cybersecurity Insiders<\/em>. Cybersecurity Insiders. https:\/\/www.cybersecurity-insiders.com\/what-is-a-cyber-kinetic-attack\/<\/p>\n\n\n\n<p>Lewis, J. A. (2022). <em>Cyber War and Ukraine<\/em>. https:\/\/www.csis.org\/analysis\/cyber-war-and-ukraine<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The definition of Kinetic Cyberwarfare is when someone causes direct or indirect harm such as injury or damage to a crucial system through vulnerabilities. This concept has already happened to hospitals, power plants, and even oil companies. An example other&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/2024\/04\/11\/module-13-watch-this-video-on-cyber-warfare-is-everywhere-he-explains-how-human-warfare-evolved-through-the-ages-and-how-cyberwarfare-is-a-culmination-of-it-all-something-new-he-t\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":27258,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[17],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts\/760"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/users\/27258"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/comments?post=760"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts\/760\/revisions"}],"predecessor-version":[{"id":780,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts\/760\/revisions\/780"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/media?parent=760"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/categories?post=760"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/tags?post=760"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}