Geovon TECH621 Presentation

521 views

Published on

Published in: News & Politics
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
521
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • Geovon TECH621 Presentation

    1. 1. Cyber WarfareWeb-based Weaponry in the Hands of Hackers
    2. 2. A Definition“Cyber warfare involves units organized alongnation-state boundaries, in offensive anddefensive operations, using computers toattack other computers or networks throughelectronic means.” Institute for Security Technology Studies Dartmouth College Source: http://www.ists.dartmouth.edu/docs/cyberwarfare.pdf
    3. 3. A History 1979: The first March 1999: hacker forum 1994: Russian Vladimir Hackers in Serbia May 1999: NATOemerges from a Levin leads a group of attack NATO accidentally bombs thecrude electronic hackers that steals systems in retaliation Chinese embassy inmessaging board. millions of dollars for NATO’s military Belgrade, spawning a from Citibank though intervention in wave of cyberattacks its dial-up wire Kosovo. from China against U.S. transfer service. government Web sites. Source: http://fcw.com/articles/2009/10/19/feat-dod-cyber-timeline.aspx
    4. 4. A History2003: Hackers begin a August 2008: series of assaults on Cyber attackers U.S. government June-July 2008: hijack government October 2009:computer systems that Hundreds of government and commercial Web The new U.S. Cyber lasts for years. The and corporate Web sites sites in Georgia Command is government code in Lithuania are hacked, during a military scheduled to beginnames the attacks Titan and some are covered in conflict with Russia. overseeing the Rain and eventually digital Soviet-era graffiti, protection of traces them to China. implicating Russian military networks nationalist hackers. from cyber threats. Source: http://fcw.com/articles/2009/10/19/feat-dod-cyber-timeline.aspx
    5. 5. The New Threat The Pentagon’s computer networks are probed 250,000 time each hour. About 6 million times a day, by “more than 140 foreign spy organizations trying ti infiltrate US networks.” Source: http://greathistory.com/uscybercoms-first-commander.htm
    6. 6. The War has Started In July of 2010, STUXNET markedthe moment whenStuxnet: Cyber Warfare became a reality - an attack originating in cyberspace targeting a part of a nation’s critical national infrastructure. The complexity of STUXNET suggests that a nation state was heavily involved in its development. If this is the case, there are massive implications for how future wars will be fought, with conflict set to be characterized by a dual campaign in cyberspace and in reality.
    7. 7. The War has Started
    8. 8. The War has Started
    9. 9. Discussion Points Anonymity Traceability Emerging Threats Catastrophic Consequences The New “H-bomb”

    ×