Cyber Map Shows Reality of Cyber Warfare 2018 Norse

As a visualization tool for understanding cyber warfare, this map displays at times a steady flow of attacks and on occasion outbursts of heavier activities. But what exactly are we looking at here? The attacks on this display are actually only on Norse's infrastructure according to Jeff Harrel Norse's vice president. So that's right, the attacks we see all across the globe are only on one single target, furthermore what is shown is only a small %1 sample of activity. If they attempted to display the entirety in real time very few computers would be able to handle the heavy system requirements of processing and displaying complex loads of data at one time. Origins and destinations are essentially of a smaller significance when you take into account the bigger picture, most of which we cannot see from our side. To better understand the situation knowing a little bit about Norse and what they do is helpful.
Based in Foster City California, Norse is a threat intelligence firm, this interactive real time visualization is a gathering of attacks happening on their infrastructure, they then record malicious IP addresses to help their customers be aware and block future communications to the black listed sources. Essentially, Norse is like a cyber activity shield, they take the first hit so their customers don't have to.

Their infrastructure is actually designed to attracts and reroute attackers to their framework via specialty sensors scattered across the world, this is why attacks appear to be consistent and fluent throughout many of their locations. These sensors are designed to appear as common computers like PC's, Mac's and ATM's that hackers are consistently looking for easy scores. Norse's clients today are in the many millions, you may even be protected by them in some way or fashion inadvertently without even knowing it.

One decisive picture here is not as easily conveyed, the picture depicts that behind every cyber attack is a human being, the motivations and reasons behind these attackers are too many to list for the purpose of this article. A great many attacks are simply automated by specialized programming and bots fishing for your bank cards or personnel information, many are not. It simply depends on the designer's motivation and the destination of intentions.

While Norse's cyber map is a good indication of the weight of such issues, newer activities on heavier hit targets tends to bring to mind the realization that we live in an ever changing cryptologically insecure world. For every action there is a reaction, for every invention there will be two sides to the coin. Try for yourself flip up the coin today and take a guess at how safe your information is and give some thought about what you yourself can do to better our world.

By JLC