Could hackers devastate the U.S. economy?


Cyber Attacks in the United States
Image used under the GNU Free Documentation License ­Contrary to what some action movies or espionage novels might depict, it’s impossible for hackers to wreak havoc on a major installation like the Hoover Dam.
Image used under the GNU Free Documentation License ­Contrary to what some action movies or espionage novels might depict, it’s impossible for hackers to wreak havoc on a major installation like the Hoover Dam.

Clearly, the United States faces a lot of security holes in its Internet infrastructure, despite the government's efforts to shore up security. But do these security lapses translate into "Die Hard"-style mayhem and destruction? Not quite. No one died in the cyber attacks on Estonia, nor is there a record of anyone ever having been killed because of a cyber attack or a computer being hacked. Some terrorist groups have expressed a desire to launch Internet-based attacks, but the main concerns actually revolve around criminal gangs that extort companies for money and angry hackers trying to make a statement (as with Estonia).

Improving security, redundancy systems, monitoring software and human oversight make it virtually impossible for cyber attacks to inflict large-scale physical casualties, or even any at all. Military systems in particular are considered quite secure, so ICBMs aren't going to be launched by an 11-year old in Beijing. Nuclear weapons, as with many other critical or classified systems, aren't even connected to the Internet [Source: Washington Monthly].

Estonia showed us that the possibility of economic damage is real, especially if hackers could shut off power supplies or infiltrate a major bank or the stock market. But in many cases, it's much easier for a hacker to gain entry into a system or network than to do any actual damage while inside. Also, the presence of well-trained human staff and proprietary systems at utilities and other vital systems means that any problems can be quickly dealt with. In the meantime, the main dangers to cyber security remain in the form of worms, viruses, Trojan horse programs and the exploitation of security flaws, all of which continue to cause billions of dollars in losses to private industry every year.

For more information about Internet security and other related topics, please check out the links below.

Related HowStuffWorks Articles

More Great Links

Sources

  • Broache, Anne. "Homeland Security finally transcends F cybersecurity grade." CNet News. Apr. 12, 2007. http://news.com.com/Homeland+Security+finally+transcends+F+cybersecurity+grade/2100-7348_3-6175666.html
  • Broache, Anne. "Homeland Security IT chief blamed for cyberwoes." CNet News. June 20, 2007. http://news.com.com/Homeland+Security+IT+chief+blamed+for+cyberwoes/2100-7348_3-6192255.html?tag=cd.top
  • Committee on Homeland Security. "Letter to Scott Charbo." Apr. 30, 2007.http://homeland.house.gov/SiteDocuments/Charbo.pdf
  • Evers, Joris. "U.S. cybersecurity czar has his marching orders." CNet News. Feb. 20, 2007. http://news.com.com/U.S.+cybersecurity+czar+has+his+marching+orders/2008-7348_3-6160438.html?tag=st.bp.story
  • Green, Joshua. "The Myth of Cyberterrorism." Washington Monthly. November 2002. http://www.washingtonmonthly.com/features/2001/0211.green.html
  • Greenemeier, Larry and Hoover, J. Nicholas. "How Does The Hacker Economy Work?" Information Week. Feb. 10, 2007.http://www.informationweek.com/showArticle.jhtml?articleID=197004939
  • Goodwin, Bill. "Act on foreign spy risk, firms urged." ComputerWeekly.com. Dec. 1, 2006. http://www.computerweekly.com/Articles/2006/12/01/220307/act-on-foreign-spy-risk-firms-urged.htm
  • Kamath, John-Paul. "Hackers could dent economy, US warned." Apr. 24, 2007.http://www.computerweekly.com/Articles/2007/04/24/223399/hackers-could-dent-economy-us-warned.htm
  • Regan, Tom. "'Cyberstorm' tests computer defenses." The Christian Science Monitor. Feb. 13, 2006. http://www.csmonitor.com/2006/0213/dailyUpdate.html
  • Vamosi, Robert. "Cyberattack in Estonia--what it really means." CNET News. May 29, 2007. http://news.com.com/Cyberattack+in+Estonia-what+it+really+means/2008-7349_3-6186751.html
  • "China trying to unseat U.S. as lead cyberpower." Reuters. CNet News. June 13, 2007. http://news.com.com/China+trying+to+unseat+U.S.+as+lead+cyberpower/2100-7349_3-6190819.html?tag=cd.top
  • "Cyber-War Web Defacements." Hackers' Attacks. May 20, 2007.http://calima.serapis.net/blogs/index.php?/archives/11-Cyber-War-Web-Defacements.html
  • "Live Free or Die Hard." Imdb.com. http://www.imdb.com/title/tt0337978/
  • "NATO says addressing cyberattacks urgent." Reuters. CNet News. June 14, 2007. http://news.com.com/NATO+says+addressing+cyberattacks+urgent/2100-7348_3-6191011.html?tag=cd.top
  • "Welcome to US-CERT." United States Computer Emergency Readiness Team. http://www.us-cert.gov/

More to Explore