Cyber WarFare in 2025


“Cyber Warfare is the use of hacking to conduct attacks on a target’s strategic or tactical resources for the purpose of espionage or sabotage.” (How does cyber warfare work?, 2013)

How Cyber Warfare works?

There are two key drivers to Cyber warfare.

1- Espionage

2- Sabotage

1-Espionage is basically taking information that wasn't meant for you. In the case of Cyber warfare, you are going to to be stealing tactical and strategic information. Information like troop movements, the strengths and weakness of weapon system,anything else about resources that might be important to know.” (How does cyber warfare work?, 2013).

On the other hand Sabotage is also "Direct Action"this is when we take an active role and go out there and do something. In cyber warfare sabotage can be something as benign as dropping a government’s website to causing a nuclear meltdown at a nuclear plant. It’s a pretty broad phrase, but just remember it means “do something” whereas espionage here means “learn something.” (How does cyber warfare work?, 2013).

Future of Cyber Warfare

When our group was researching one prevalent theme kept coming up and that was that a big cyber-attack was looming in the near future.” The world is likely to suffer a major cyber-attack causing "widespread harm to a nation's security and capacity to defend itself" before 2025, according to a survey of more than 1,600 experts carried out by the Pew Research Center. Sixty-one per cent of respondents - which included policymakers, researchers, analysts and engineers - said that they thought a major attack was likely while 39 per cent said "no".” (Vincent, 2014).

Strategic cyber warfare does not distinguish between civilians and military, Just like nuclear weapons in the cold war, cyber weapons are just as likely to be targeting civilian resources as they are military ones.” (How does cyber warfare work?, 2013) Peter W. Singer, director of the Center for 21st Century Security and Intelligence at the Brookings Institution, said “100 nations are building cyber military commands of that there are about 20 that are serious players, and a smaller number could carry out a whole cyberwar campaign” (Ranger, 2014). There is a paradigm switch in how warfare will be played out in the future and we believe that it will be in cyber space.

Develop Countries Prevention plan

In the last few years a trend has been developing around the world were governments have been investing large amounts of their military resources into cyber warfare. The UK’s defence secretary Philip Hammond said "We will build in Britain a cyber-strike capability so we can strike back in cyberspace against enemies who attack us, putting cyber alongside land, sea, air and space as a mainstream military activity." (Ranger, 2014). If such a large nation as Britain considers cyber as much part of their territory as land, sea and air the future of warfare truly will be scary with capabilities of attacking anywhere at any time and undetected and the most terrifying of most.

In this new era of warfare the United States military wants to develop capabilities to have an advantage over its enemies. The Pentagon’s Defense Advanced Research Projects Agency DARPA for short, is looking into a technology called Oculus Rift virtual reality headgear to help it enhance the American cyber warfare program. Virtual reality according to oxford dictionaries is defined as “A computer-generated simulation of a three-dimensional image or environment that can be interacted with in a seemingly real or physical way by a person using special electronic equipment, such as a helmet with a screen inside or gloves fitted with sensors.” (Oxford Dictionaries). What DARPA wants to achieve by using the Oculus Rift virtual reality equipment is “The idea is to help soldiers prepare for cyberattacks by giving them the chance to feel as if they were actually inside the Internet. DARPA believes that the new tech could advance understanding of how hackers function inside the Internet as a means to helping to prevent future attacks from being successful.” (Mayton, 2014) DARPA is already creating its own 3D interpretation of the internet called plan X, and will be utilized with the Oculus Rift so that people can be trained to virtually move through visual model of the internet. The goal with this technology “would allow military personnel and others to have the sensation that they are in the midst of an online hack and security breach. This would allow wearers to develop a keener sense of how the Internet functions, ultimately with the goal of developing weapons or systems to help prevent cyberattacks.” (Mayton, 2014)

Prevention from Cyber warfare

Something we came across was the future of developing system that are harder to attack. According to expert Ram Levi the problem that is the advantage a cyber-attacker has versus the defending system is to change the current culture of cyber security that could increase cost on the attacker making it more difficult to execute an attack. “The systems we use are mostly unchanging and not very dynamic in their configuration so, currently, attackers have an advantage in exploiting systems,” (Gini, 2014) Levi explained how this problem could be combated or at least put on more even grounds “We can increase the cost on the attacker by making the systems much more complex and dynamic so that the he would have to pay a higher price in resources for attacking a system” (Gini, 2014) The method is being called “Moving Target” and is suggested by The White house “This approach, currently under research, will enable us to ‘create, analyze, evaluate, and deploy mechanisms and strategies that are diverse and that continually shift and change over time to increase complexity and cost for attackers, limit the exposure of vulnerabilities and opportunities for attack, and increase system resiliency” (Gini, 2014)

Recent Events of Cyber warfare

“In January 2010, inspectors with the International Atomic Energy Agency visiting the Natanz uranium enrichment plant in Iran noticed that centrifuges used to enrich uranium gas were failing at an unprecedented rate. The cause was a complete mystery” (Zetter, 2014) It was later discovered that the reason for the mysterious failures was due to a complex virus known as Stuxnet. Stuxnet became the first cyber weapon of its kind to be created “Stuxnet, was unlike any other virus or worm that came before. Rather than simply hijacking targeted computers or stealing information from them, it escaped the digital realm to wreak physical destruction on equipment the computers controlled.” (Zetter, 2014) The destruction was not isolated to just one of the plants but in fact infected all the sites producing enriched uranium. “attackers have designed their weapon to spread via infected USB flash drives using the Windows Autorun feature to get Stuxnet to its target machines, the attackers first infect computers belonging to five outside companies that are believed to be connected in some way to the nuclear program” (Zetter, 2014) What makes Stuxnet especially scary is that a source of the virus can be downloaded for free off the internet for anyone to tinker with and use in any manner they wish.

Video below explains us about Stuxnet

Recent Event of Cyber War Attacks

Defense Plan to Prevent Cyber warfare

  • Proper Education and training
  • Developing new technology and new technique
  • Providing Intermediate

We hope this presentation was informative and that you have hopefully a better understanding of what cyberwar fare is and were the future of it may be headed.


Zetter, K. (2014, November 3). An Unprecented Look At Stuxnet, The World's FIrst Digital Weapon. Retrieved from

Future Computers Quantum Computing Nanotechnology Artificial Intelligence | Future Technology 500. (n.d.). Retrieved from

Stuxnet - Cyber Warfare. (n.d.). Retrieved from

The Future of Cyber Warfare. (n.d.). Retrieved from

How Does Cyber Warfare Work? - Forbes. (n.d.). Retrieved from

Cyber defence in the EU: Preparing for cyber warfare? | European Parliamentary Research Service. (n.d.). Retrieved from

Cyber Crime - From Cyber Space to Outer Space. (n.d.). Retrieved from

8 terrifying cybercrimes of 2025 | News | TechRadar. (n.d.). Retrieved from

DARPA uses Oculus Rift technology to prep military for cyberwarfare : FUTURE TECH : Tech Times. (n.d.). Retrieved from

Inside the secret digital arms race: Facing the threat of a global cyberwar - Feature - TechRepublic. (n.d.). Retrieved from

virtual reality - definition of virtual reality in English from the Oxford dictionary. (n.d.). Retrieved from

World due for a major cyber attack before 2025, say experts | Sunshine Coast Daily. (n.d.). Retrieved from

Comment Stream