Violence/armed conflict
Violence/armed conflict - Use or misuse of a technology system to incite, facilitate or conduct cyberattacks, security breaches, lethal, biological and chemical weapons development, resulting in violence and armed conflict.
ENTITY
1 - Human
INTENT
1 - Intentional
TIMING
2 - Post-deployment
Risk ID
mit977
Domain lineage
4. Malicious Actors & Misuse
4.2 > Cyberattacks, weapon development or use, and mass harm
Mitigation strategy
1. Implement rigorous governance and assurance frameworks for all technology systems involved in high-consequence domains such as defense, biosecurity, and critical infrastructure. This must include mandatory human-in-the-loop protocols to mitigate automation bias and decision-time compression, continuous re-assessment of system behavior and data integrity (change management), and strict adherence to international law and ethical guidelines concerning the use of force and non-proliferation. 2. Establish and enforce stringent, layered network access controls, prioritizing Privileged Access Management (PAM) solutions and mandatory Multi-Factor Authentication (MFA) across all high-value assets and administrative accounts. Furthermore, utilize modern operating systems to enforce signed software execution policies and application whitelisting to prevent unauthorized code injection, system tampering, and the establishment of malicious persistence. 3. Develop and continuously exercise a comprehensive incident response and system recovery plan specifically designed for complex cyber-physical or technology-facilitated attacks. This plan must integrate continuous monitoring and real-time threat detection capabilities across the IT ecosystem, provide for immediate containment and eradication of malicious presence, and ensure the capacity for secure, offline reconstitution of critical data and systems from encrypted backups.