SlideShare a Scribd company logo
1 of 40
Download to read offline
Rajeev Chauhan
Confession
I am Naive
I don’t know the nuances of Cyber World
Vocabulary
Rajeev Chauhan
CYBER WAR
Definition
The use of computer technology, most prominently the
internet, in order to disrupt, deny or degrade the
capabilities of an adversary, to an extent that it
cripples its day to day activities
Rajeev Chauhan
AIM
To degrade the capabilities of an adversary with
ultimate goal of coercing adversary for a political
purpose, besides hacking into the servers, stealing
sensitive information.
Rajeev Chauhan
HISTORY
1982
• The Soviet Union planned to steal software from a Canadian company to control its Trans-Siberian
Pipeline,
• the CIA alters the software to cause the pipeline to explode.
1986
• A hacker tracked to Germany by a researcher in US over a period of 10 months
• First recorded case of such investigation
1988
• Morris worm shuts down 10% of internet
• First case of conviction for cyber crime
1994
• Computers hacked at the Rome Air Development Center at Griffiss Air Force Base New York by
anonymous hacker and sensitive data stolen
Rajeev Chauhan
HISTORY
1997
• The NSA conducts a test, known as Eligible Receiver, to assess the vulnerability of government and
military computers to a cyberattack
1998
• DoD establishes Joint Task force to defend computer networks
2001
• The worm named Code Red affects computer networks running a Microsoft operating system. Some
websites, including the White House site, are disabled.
2003
• Operation Titan Rain : US targeted allegedly by China for stealing info Vulnerable systems .
Rajeev Chauhan
HISTORY
2007
• Estonia experiences DoS for 22 days by the hackers believed to be backed by Russian Government.
• British and US Government officials alleged that official emails accounts hacked by PLA
2008
• Georgia faces DDoS attack and blames Russia for that. Media Transportation and Government
Computer Networks crippled
• First case of data stealing through a flash drive using covert program at US base in Middle East.
2009
• Israel Government sites subjected to Spam mail to the tune of 15 million emails per second. Israel
blamed Hamas.
• 103 country including Indian Government and embassies computers hacked allegedly by China,
2010
• Sensitive information stolen from Ministry of Defence Computers in India, suspect is China
• Stuxnet cripples Iranian Nuclear installation.
• Pentagon Declares Cyber War as Fifth domain
Rajeev Chauhan
HISTORY
2011
• IMF computers hacked , fingers point towards China
• Hackers delete hard drives of 30k computers in Saudi oil company.
• Military Wing of HAMAS carry out massive DDoS against nine US banks.
• U.S. Secretary of Defense Leon Panetta warns that the U.S. must protect itself against a “Cyber Pearl
Harbor."
2013
• The New York Times Website shut down for 20 hours by Syrian Electronic Army.
2014
• Chinese hackers had breached the computer network of the Office of Personnel Management in March.
• The computer networks of Sony Pictures were hacked, allegedly by North Korea
2015
• The Russian hackers penetrated the email archives of White House and State Dept. officials
correspondence with President Barack Obama.
Rajeev Chauhan
CYBER WAR
• Transition in dimensions of warfare from
physical to Cyber space.
• Assumed importance as fifth dimension.
• Security of cyberspace based on traditional
axioms of threats
• Affects Confidentiality, Integrity and
Availability besides new realm of Data
Thefts.
Rajeev Chauhan
CYBER WAR
• Cyber warfare is closely related to other
aspects of cyber threats such as cyber crime,
cyber terrorism, cyber espionage and cyber
spying.
• Cyber war also includes the development
and implementation of security strategies to
defend against such attack mechanisms.
Rajeev Chauhan
CYBER WAR
• At least 12 of the world’s 15 largest military powers
are currently building cyber warfare programs,
according to James Lewis, a cyber security expert at
the Center for Strategic and International Studies.
• The US has had a major influence on the
development of cyberspace by virtue of the fact that
much of the initial infrastructure and use was
centered in that country and it continues to be a
major force in its development and use.
Rajeev Chauhan
CYBER WARFARE
• Recce
• Enum
• Foot printing
• System hacking/attack
– DDos
– Trojans/backdoors
– Virus/Worms
– Session hijacking
• Maintain Contact
• Remove traces
Rajeev Chauhan
CYBER WARFARE
CAPABILITIES
– China
– US
– UK
– North Korea
– Australia
– Israel
– Iran
– Russia
– Germany
– Netherlands
– India
• Countries with capabilities to launch
Cyber war
Rajeev Chauhan
CHINA
Rajeev Chauhan
CHINA
• Admitted to having a dedicated Cyber War launching
capabilities.
• According to the cyber security firm Mandiant, the People’s
Liberation Army (PLA) has been using an elite cyber warfare
unit based in Shanghai to launch hundreds of cyber attacks
targeting mainly American.
• The unit, officially known as Unit 61398, operates under the
PLA’s Second Bureau of the General Staff Department’s (GSD)
Third Department.
• The PLA’s Unit 61398 is known for its use of zero-day exploits.
According to Mandiant, Unit 61398’s informal name was APT1
due to their skill at successfully carrying out advanced persistent
threats. Rajeev Chauhan
CHINA
• China has “reached out” to people with the
necessary cyber skills in the IT sector and
academic community to help fill any gaps in
state expertise and personnel when needed.
• In October 2014, the FBI issued a warning
that a Chinese hacking collective known as
Axiom has been engaged in a sophisticated
campaign to steal valuable data from U.S.
government agencies.
Rajeev Chauhan
CHINA
• Taiwan’s National Security Bureau (NSB) has
identified another unit of the GSD’s Third
Department that is involved in cyber-
activities.(source Taipei Times)
• China’s cyber capabilities are organized by a
strategy involving “to establish information
dominance.”
• Information dominance refers to:
– taking and maintaining control of an adversary’s access
to its own information, and
– disrupting the flow of information necessary for
“decision-making or combat operations.”
Rajeev Chauhan
US
Rajeev Chauhan
Images: Copyright of respective owners
US
• United States Cyber Command (USCYBERCOM) is
an armed forces sub-unified command subordinate
to United States Strategic Command and centralizes
command of cyberspace operations, organizes existing
cyber resources and synchronizes defense of U.S.
military networks. (wiki).
• The Army Cyber Command (ARCYBER) is an Army
component command for the U.S. Cyber Command:
– Army Network Enterprise Technology Command / 9th
Army Signal Command
– Portions of 1st Information Operations Command (Land)
– United States Army Intelligence and Security
Command will be under the operational control of
ARCYBER for cyber-related actionsRajeev Chauhan
US
• Marine Corps Forces Cyberspace Command
• Navy Cyber Forces
• Twenty-Fourth Air Force with following components
– 67th Network Warfare Wing
– 688th Information Operations Wing
– 689th Combat Communications Wing
• United States Tenth Fleet, consisting of
– Naval Network Warfare Command
– Navy Cyber Defense Operations Command
– Naval Information Operation Commands
– Combined Task Forces Rajeev Chauhan
US
• Cyberwarfare in the United States is the United States
Cyber Command's military strategy of Proactive Cyber
Defence and the use of cyber warfare as a platform for
attack.
• The five pillars is the framework for the United States
military strategy for cyber warfare.
– Cyberspace as new warfare domain
– Proactive defense
– Critical infra protection
– Collective defense
– Maintain and enhance the advantage of technological change
Rajeev Chauhan
UK
GCHQ
Rajeev Chauhan
UK
• Britain will create a new cyber unit which will be known
as the Joint Cyber Reserve.(2013)
– will be tasked primarily with defending the UK against cyber
attacks
– will also have the capability to launch strikes where deemed
necessary
• Ministry of Defence (MoD) will be looking to employ
hundreds of IT experts who will be responsible for
defending the nation’s critical data and computer
networks.
• Cyber defences blocked around 400,000 advanced
malicious cyber threats against the government’s secure
internet alone Rajeev Chauhan
UK
• An Army unit, called the 77th Brigade, is set up to
help fight the cyberwars of the future.
– Made up from reservists as well as regulars from all three
services of the armed forces.
– The team is modelled on the Chindits, a specialist unit
which fought in Burma during the Second World War.
– “clinical cyber strikes” could be used to disable key
military assets such as nuclear and chemical weapons,
enemy communications and other tools of war.
Rajeev Chauhan
GCHQ
(Government Communication Head Quarter)
• GCHQ is an intelligence and security organisation, working to
keep Britain safe and secure in the challenging environment of
modern communications
• GCHQ strives to ensure that life in the UK isn't compromised
through cyber attack or on-line serious crime, employing some
of the world's leading experts on Information Security (how do
we work).
• GCHQ and its sister agencies, MI5 and the Secret Intelligence
Service, could not tackle the cyber challenges "at scale"
without greater support from the private sector, including the
largest US technology companies which dominate the web.
Rajeev Chauhan
UK
Rajeev Chauhan
NORTH KOREA
• Cyber attacks like the one inflicted by the North
Korean government on Sony are just the opening
skirmishes before the outbreak of a hugely
dangerous cyber war that is inevitable.
• North Korea has natural cyber-defenses
• Why?
– it only has about 1,000 IP addresses,
– it has only very few computers so its 'terrain' is very
defensible.
Rajeev Chauhan
AUSTRALIA
• Recent references in cooperation with US in spying on Asian
countries, especially India.
• Australian Signals Directorate with support from the Defence
Science and Technology Organisation has developed new cyber
offensive capabilities in 2014, to carryout,
– DoS
– Access, modify and Delete Data remotely
– Dissemination of False Information
– Penetration of FW protecting Avionics of targets, inserting Trojan
Horses
• Part of 5-Eye partners....US, UK, Canada, Australia and New
Zealand.
Rajeev Chauhan
ISRAEL
• IDF has announced in June
– Establish a Cyber Command within two years.
– Includes Military Intelligence and C4I Telecommunications division.
• Contribute towards the overall IDF Cyber Potential.
• Challenges would be to attain both long range planning and
precise execution capabilities at different level with optimal
degree of operational flexibility in both offensive and defensive
theatre.
• DMI’s 8200 signal intelligence unit was handling int collection
and offensive missions, whereas C4I directorate was handling
cyber defensive missions.
Rajeev Chauhan
ISRAEL
• Salient points:-
– The cyber command will be in charge of both the buildup and
operational missions.
– DMIs working in cyber space in conjunction with conventional
intelligence gathering missions has not contributed to overall
operational effectiveness.
– Synergy between DMIs intelligence gathering and offensive
setup with various cyber units.
– Reciprocal data gathering and dissemination amongst other
branches.
– Maximum operational cooperation and coordination between
New Command and other IDF forces and units
– Coordination with civilian agencies like National Cyber
Bureau and Cyber Authority.Rajeev Chauhan
IRAN
• Since November 2010, an organization called “The Cyber
Defense Command” has been operating in Iran under the
supervision of the country’s “Passive Civil Defense
Organization” a subdivision of the Joint Staff of Iranian
Armed Forces.
• According to a 2014 report by Institute for National
Security Studies, Iran is "one of the most active players in
the international cyber arena“.
• In June 2010, Iran was the victim of a cyber attack when
its nuclear facility in Natanz was infiltrated by the cyber-
worm ‘Stuxnet’. Thereafter it has learnt a lot and
developed a potent cyber warfare capabilities.
Rajeev Chauhan
RUSSIA
• It has been claimed that Russian security services
organized a number of denial of service attacks as a part
of their Cyber-warfare against other countries, most
notably
– 2007 cyber attacks on Estonia
– 2008 cyber attacks on South Ossetia, Georgia, and Azerbaijan.
• The Russian government had been fostering and financing
the Nashi youth organization for more than years. Nashi
members were involved in the Estonia cyber attacks of
2007, Georgian govt websites in 2008 and targeted
individual Georgian supporters in 2009
Rajeev Chauhan
RUSSIA
• Since 2010, Russia like the U.S., China and other
countries has made dual use information security
research and development a top priority at dozens of
top research institutes and universities.
• At least twelve institutes provide world-class
instruction to their graduates in dual use
information security and electronic warfare
technologies, who are then hired by the Security
Services and Ministry of Defense for offensive and
defensive operations.
Rajeev Chauhan
NETHERLAND
• In the Netherlands Cyber Defense is nationally coordinated by the
National Cyber Security Center (NCSC).
• The Dutch Ministry of Defense laid out a cyber strategy in 2011.
• The first focus is to improve the cyber defense handled by the
Joint IT branch (JIVC).
• Joint Sigint Cyber Unit (JSCU) has been setup with an aim to
improve intel operations in the Netherlands (including the
military intel organization MIVD)
• The Ministry of Defense has set up an offensive cyber force,
called Defense Cyber Command (DCC)
Rajeev Chauhan
GERMANY
• In 2013, Germany admitted the existence of their 60-
person Computer Network Operation unit.
• The German intelligence agency, BND, announced that his
agency had observed up to five attacks a day on
government authorities, thought mainly to originate in
China.
• After Edward Snowden leaked details of the U.S. National
Security Agency's cyber surveillance system, Germany
announced that the BND would be given an additional
budget of 100 million Euros to increase their cyber
surveillance capability.
Rajeev Chauhan
INDIA: Why?
• Cyber Attacks affecting national infrastructure through
– Sensitive information leaks….Confidentiality
– Malicious programs effecting critical operations and
applications like power, communication etc…..
– Denial of Services, bringing down critical financial and
banking infrastructure….effecting their Availability.
• Attack on availability of CII is grave in nature as it has
direct impact on national assets and their functioning.
• All types of threats to be addressed in any National
Cyberspace Protection Policies and Procedures.
Rajeev Chauhan
INDIA: Where do we stand?
• Indian Cyberspace subjected to frequent attacks by
China, Pakistan, US, UK, Bangladesh, Anonymous
• Cyber Security Policies …implementation?
• Agencies..CERT-IN, NTRO, NCCC(National Cyber
Coord Committee), NATGRID, NCIIPC
• Potent offensive capabilities
• Capability to sustain
• Disaster management and continuity plan
• Robustness of CII
Rajeev Chauhan
• Chinese are focused…are we!
• Offensive and Defensive capability….
Rajeev Chauhan
Rajeev Chauhan
References
1. http://strategicstudyindia.blogspot.in/2014/02/cyber-warfare-and-
information-security.html
2. http://thediplomat.com/2015/04/chinas-growing-cyberwar-capabilities/
3. http://bhconsulting.ie/securitywatch/?p=1739
4. http://www.bbc.co.uk/newsbeat/article/31074227/the-internet-is-the-
new-frontline-as-uk-sets-up-army-cyber-unit
5. https://en.wikipedia.org/wiki/United_States_Cyber_Command
6. http://www.esecurityplanet.com/network-security/cyber-war-is-
hell.html?utm_source=dlvr.it&utm_medium=twitter
7. Australian Defence Review.
8. http://jeffreycarr.blogspot.in/2014/03/russian-cyber-warfare-capabilities-
in.html
9. http://www.infoplease.com/world/events/cyberwar-timeline.html
Rajeev Chauhan

More Related Content

What's hot

Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usualEnclaveSecurity
 
Terror And Technology
Terror And TechnologyTerror And Technology
Terror And Technologypradhansushil
 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Digicomp Academy AG
 
Future of Chinese Cyber Warfare
Future of Chinese Cyber WarfareFuture of Chinese Cyber Warfare
Future of Chinese Cyber WarfareBill Hagestad II
 
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014Bill Hagestad II
 
Egypt Cloud Day, May2011-- Information Assurance
Egypt Cloud Day, May2011-- Information Assurance Egypt Cloud Day, May2011-- Information Assurance
Egypt Cloud Day, May2011-- Information Assurance Egypt Cloud Forum
 
Great Chinese Hack of the United States Government's Personnel Office in 2015
Great Chinese Hack of the United States Government's Personnel Office in 2015Great Chinese Hack of the United States Government's Personnel Office in 2015
Great Chinese Hack of the United States Government's Personnel Office in 2015Dr. Tim Dosemagen
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentationmerlyna
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat Mishra
 
Evolving chinese military cyber doctrine 中国网络战部队
Evolving chinese military cyber doctrine 中国网络战部队Evolving chinese military cyber doctrine 中国网络战部队
Evolving chinese military cyber doctrine 中国网络战部队Bill Hagestad II
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Ajay Serohi
 
Us gov't building hacker army for cyber war yahoo! news
Us gov't building hacker army for cyber war   yahoo! newsUs gov't building hacker army for cyber war   yahoo! news
Us gov't building hacker army for cyber war yahoo! newsMarioEliseo3
 
Ce Hv6 Module 43 Cyber Warfare Hacking Al Qaida And Terrorism
Ce Hv6 Module 43 Cyber Warfare  Hacking Al Qaida And TerrorismCe Hv6 Module 43 Cyber Warfare  Hacking Al Qaida And Terrorism
Ce Hv6 Module 43 Cyber Warfare Hacking Al Qaida And TerrorismKislaychd
 

What's hot (20)

Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usual
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
 
About cyber war
About cyber warAbout cyber war
About cyber war
 
Terror And Technology
Terror And TechnologyTerror And Technology
Terror And Technology
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)
 
Future of Chinese Cyber Warfare
Future of Chinese Cyber WarfareFuture of Chinese Cyber Warfare
Future of Chinese Cyber Warfare
 
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014
 
CYBER TERRORISM
CYBER TERRORISM CYBER TERRORISM
CYBER TERRORISM
 
Egypt Cloud Day, May2011-- Information Assurance
Egypt Cloud Day, May2011-- Information Assurance Egypt Cloud Day, May2011-- Information Assurance
Egypt Cloud Day, May2011-- Information Assurance
 
Great Chinese Hack of the United States Government's Personnel Office in 2015
Great Chinese Hack of the United States Government's Personnel Office in 2015Great Chinese Hack of the United States Government's Personnel Office in 2015
Great Chinese Hack of the United States Government's Personnel Office in 2015
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 
Evolving chinese military cyber doctrine 中国网络战部队
Evolving chinese military cyber doctrine 中国网络战部队Evolving chinese military cyber doctrine 中国网络战部队
Evolving chinese military cyber doctrine 中国网络战部队
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Us gov't building hacker army for cyber war yahoo! news
Us gov't building hacker army for cyber war   yahoo! newsUs gov't building hacker army for cyber war   yahoo! news
Us gov't building hacker army for cyber war yahoo! news
 
Ce Hv6 Module 43 Cyber Warfare Hacking Al Qaida And Terrorism
Ce Hv6 Module 43 Cyber Warfare  Hacking Al Qaida And TerrorismCe Hv6 Module 43 Cyber Warfare  Hacking Al Qaida And Terrorism
Ce Hv6 Module 43 Cyber Warfare Hacking Al Qaida And Terrorism
 

Viewers also liked

Evaluation question 1
Evaluation question 1Evaluation question 1
Evaluation question 1W07ULONGWE
 
Presentation
PresentationPresentation
Presentationstoutkm
 
eTailing India Chennai Conclave 2013 Part 12
eTailing India Chennai Conclave 2013 Part 12eTailing India Chennai Conclave 2013 Part 12
eTailing India Chennai Conclave 2013 Part 12eTailing India
 
eTailing India Chennai Conclave 2013 Part 13
eTailing India Chennai Conclave 2013 Part 13eTailing India Chennai Conclave 2013 Part 13
eTailing India Chennai Conclave 2013 Part 13eTailing India
 
eTailing India Chennai Conclave 2013 Part 9
eTailing India Chennai Conclave 2013 Part 9eTailing India Chennai Conclave 2013 Part 9
eTailing India Chennai Conclave 2013 Part 9eTailing India
 
Монетизация интернет-проектов
Монетизация интернет-проектовМонетизация интернет-проектов
Монетизация интернет-проектовOleg Bukatchuk
 
Dyna Corp : Packaging Solution for eCommerce Companies
Dyna Corp : Packaging Solution for eCommerce CompaniesDyna Corp : Packaging Solution for eCommerce Companies
Dyna Corp : Packaging Solution for eCommerce CompanieseTailing India
 
Atom Workshop : Payment Solutions For Modern Retail
Atom Workshop : Payment Solutions For Modern Retail Atom Workshop : Payment Solutions For Modern Retail
Atom Workshop : Payment Solutions For Modern Retail eTailing India
 
Football sponsorship offers in Portugal
Football sponsorship offers in PortugalFootball sponsorship offers in Portugal
Football sponsorship offers in PortugalCCIMediaSwitzerland
 
Football sponsorship offers portugal
Football sponsorship offers portugalFootball sponsorship offers portugal
Football sponsorship offers portugalCCIMediaSwitzerland
 
dene/TIVIACE_turkce.pdf
dene/TIVIACE_turkce.pdfdene/TIVIACE_turkce.pdf
dene/TIVIACE_turkce.pdfBatın Düz
 
About cci media connecting solutions introduction 2012
About cci media connecting solutions   introduction 2012About cci media connecting solutions   introduction 2012
About cci media connecting solutions introduction 2012CCIMediaSwitzerland
 
Rasheed resumere 2013
Rasheed resumere 2013Rasheed resumere 2013
Rasheed resumere 2013promohazard
 
Experts4you present
Experts4you presentExperts4you present
Experts4you presentseisemeia
 
Module 4
Module 4Module 4
Module 4sklarde
 
What's New in NAV 2013
What's New in NAV 2013What's New in NAV 2013
What's New in NAV 2013SociusPartner
 
продвижение в социальных сетях
продвижение в социальных сетяхпродвижение в социальных сетях
продвижение в социальных сетяхOleg Bukatchuk
 
Abdul jawi kepimpinan_kepuasan_pembelajaran
Abdul jawi kepimpinan_kepuasan_pembelajaranAbdul jawi kepimpinan_kepuasan_pembelajaran
Abdul jawi kepimpinan_kepuasan_pembelajaranShinz Cucut
 

Viewers also liked (20)

Evaluation question 1
Evaluation question 1Evaluation question 1
Evaluation question 1
 
Presentation
PresentationPresentation
Presentation
 
dene/ders1.ppt
dene/ders1.pptdene/ders1.ppt
dene/ders1.ppt
 
eTailing India Chennai Conclave 2013 Part 12
eTailing India Chennai Conclave 2013 Part 12eTailing India Chennai Conclave 2013 Part 12
eTailing India Chennai Conclave 2013 Part 12
 
eTailing India Chennai Conclave 2013 Part 13
eTailing India Chennai Conclave 2013 Part 13eTailing India Chennai Conclave 2013 Part 13
eTailing India Chennai Conclave 2013 Part 13
 
eTailing India Chennai Conclave 2013 Part 9
eTailing India Chennai Conclave 2013 Part 9eTailing India Chennai Conclave 2013 Part 9
eTailing India Chennai Conclave 2013 Part 9
 
Монетизация интернет-проектов
Монетизация интернет-проектовМонетизация интернет-проектов
Монетизация интернет-проектов
 
Dyna Corp : Packaging Solution for eCommerce Companies
Dyna Corp : Packaging Solution for eCommerce CompaniesDyna Corp : Packaging Solution for eCommerce Companies
Dyna Corp : Packaging Solution for eCommerce Companies
 
Atom Workshop : Payment Solutions For Modern Retail
Atom Workshop : Payment Solutions For Modern Retail Atom Workshop : Payment Solutions For Modern Retail
Atom Workshop : Payment Solutions For Modern Retail
 
Football sponsorship offers in Portugal
Football sponsorship offers in PortugalFootball sponsorship offers in Portugal
Football sponsorship offers in Portugal
 
Football sponsorship offers portugal
Football sponsorship offers portugalFootball sponsorship offers portugal
Football sponsorship offers portugal
 
John Carlos
John CarlosJohn Carlos
John Carlos
 
dene/TIVIACE_turkce.pdf
dene/TIVIACE_turkce.pdfdene/TIVIACE_turkce.pdf
dene/TIVIACE_turkce.pdf
 
About cci media connecting solutions introduction 2012
About cci media connecting solutions   introduction 2012About cci media connecting solutions   introduction 2012
About cci media connecting solutions introduction 2012
 
Rasheed resumere 2013
Rasheed resumere 2013Rasheed resumere 2013
Rasheed resumere 2013
 
Experts4you present
Experts4you presentExperts4you present
Experts4you present
 
Module 4
Module 4Module 4
Module 4
 
What's New in NAV 2013
What's New in NAV 2013What's New in NAV 2013
What's New in NAV 2013
 
продвижение в социальных сетях
продвижение в социальных сетяхпродвижение в социальных сетях
продвижение в социальных сетях
 
Abdul jawi kepimpinan_kepuasan_pembelajaran
Abdul jawi kepimpinan_kepuasan_pembelajaranAbdul jawi kepimpinan_kepuasan_pembelajaran
Abdul jawi kepimpinan_kepuasan_pembelajaran
 

Similar to Cyber warfare capabiliites : A Reality Check

Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopoliticstnwac
 
Countering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaCountering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaMurray Security Services
 
Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorKhalizan Halid
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Chuck Brooks
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...David Sweigert
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanShojan Jacob
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...Boston Global Forum
 
Computer Attack Stratagems
Computer Attack StratagemsComputer Attack Stratagems
Computer Attack StratagemsKarl Wolfgang
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaEvan Pathiratne
 
Cyber Security, Cyber Warfare
Cyber Security, Cyber WarfareCyber Security, Cyber Warfare
Cyber Security, Cyber WarfareAmit Anand
 
Case studies in cybersecurity strategies
Case studies in cybersecurity strategiesCase studies in cybersecurity strategies
Case studies in cybersecurity strategiesEyesOpen Association
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Jim Geovedi
 
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas mariaidga
 
Cyber Warfare Europe 2011
Cyber Warfare Europe 2011Cyber Warfare Europe 2011
Cyber Warfare Europe 2011Sharmin Ahammad
 
Prosecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the WebProsecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the WebDarius Whelan
 

Similar to Cyber warfare capabiliites : A Reality Check (20)

Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopolitics
 
Countering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaCountering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from China
 
Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditor
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
 
Cyber Wars.pptx
Cyber Wars.pptxCyber Wars.pptx
Cyber Wars.pptx
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace Shojan
 
Exp r35
Exp r35Exp r35
Exp r35
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
 
Computer Attack Stratagems
Computer Attack StratagemsComputer Attack Stratagems
Computer Attack Stratagems
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri Lanka
 
Cyber Security, Cyber Warfare
Cyber Security, Cyber WarfareCyber Security, Cyber Warfare
Cyber Security, Cyber Warfare
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Case studies in cybersecurity strategies
Case studies in cybersecurity strategiesCase studies in cybersecurity strategies
Case studies in cybersecurity strategies
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?
 
Cyber espionage
Cyber espionageCyber espionage
Cyber espionage
 
Hacking
Hacking Hacking
Hacking
 
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas
 
Cyber Warfare Europe 2011
Cyber Warfare Europe 2011Cyber Warfare Europe 2011
Cyber Warfare Europe 2011
 
Prosecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the WebProsecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the Web
 

Recently uploaded

Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxraffaeleoman
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxmohammadalnahdi22
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...Sheetaleventcompany
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubssamaasim06
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AITatiana Gurgel
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Kayode Fayemi
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Delhi Call girls
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Vipesco
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesPooja Nehwal
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Hasting Chen
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfSenaatti-kiinteistöt
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardsticksaastr
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxNikitaBankoti2
 
Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsaqsarehman5055
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024eCommerce Institute
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024eCommerce Institute
 
Mathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMoumonDas2
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyPooja Nehwal
 

Recently uploaded (20)

Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubs
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
 
Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animals
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
 
Mathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptx
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
 

Cyber warfare capabiliites : A Reality Check

  • 2. Confession I am Naive I don’t know the nuances of Cyber World Vocabulary Rajeev Chauhan
  • 3. CYBER WAR Definition The use of computer technology, most prominently the internet, in order to disrupt, deny or degrade the capabilities of an adversary, to an extent that it cripples its day to day activities Rajeev Chauhan
  • 4. AIM To degrade the capabilities of an adversary with ultimate goal of coercing adversary for a political purpose, besides hacking into the servers, stealing sensitive information. Rajeev Chauhan
  • 5. HISTORY 1982 • The Soviet Union planned to steal software from a Canadian company to control its Trans-Siberian Pipeline, • the CIA alters the software to cause the pipeline to explode. 1986 • A hacker tracked to Germany by a researcher in US over a period of 10 months • First recorded case of such investigation 1988 • Morris worm shuts down 10% of internet • First case of conviction for cyber crime 1994 • Computers hacked at the Rome Air Development Center at Griffiss Air Force Base New York by anonymous hacker and sensitive data stolen Rajeev Chauhan
  • 6. HISTORY 1997 • The NSA conducts a test, known as Eligible Receiver, to assess the vulnerability of government and military computers to a cyberattack 1998 • DoD establishes Joint Task force to defend computer networks 2001 • The worm named Code Red affects computer networks running a Microsoft operating system. Some websites, including the White House site, are disabled. 2003 • Operation Titan Rain : US targeted allegedly by China for stealing info Vulnerable systems . Rajeev Chauhan
  • 7. HISTORY 2007 • Estonia experiences DoS for 22 days by the hackers believed to be backed by Russian Government. • British and US Government officials alleged that official emails accounts hacked by PLA 2008 • Georgia faces DDoS attack and blames Russia for that. Media Transportation and Government Computer Networks crippled • First case of data stealing through a flash drive using covert program at US base in Middle East. 2009 • Israel Government sites subjected to Spam mail to the tune of 15 million emails per second. Israel blamed Hamas. • 103 country including Indian Government and embassies computers hacked allegedly by China, 2010 • Sensitive information stolen from Ministry of Defence Computers in India, suspect is China • Stuxnet cripples Iranian Nuclear installation. • Pentagon Declares Cyber War as Fifth domain Rajeev Chauhan
  • 8. HISTORY 2011 • IMF computers hacked , fingers point towards China • Hackers delete hard drives of 30k computers in Saudi oil company. • Military Wing of HAMAS carry out massive DDoS against nine US banks. • U.S. Secretary of Defense Leon Panetta warns that the U.S. must protect itself against a “Cyber Pearl Harbor." 2013 • The New York Times Website shut down for 20 hours by Syrian Electronic Army. 2014 • Chinese hackers had breached the computer network of the Office of Personnel Management in March. • The computer networks of Sony Pictures were hacked, allegedly by North Korea 2015 • The Russian hackers penetrated the email archives of White House and State Dept. officials correspondence with President Barack Obama. Rajeev Chauhan
  • 9. CYBER WAR • Transition in dimensions of warfare from physical to Cyber space. • Assumed importance as fifth dimension. • Security of cyberspace based on traditional axioms of threats • Affects Confidentiality, Integrity and Availability besides new realm of Data Thefts. Rajeev Chauhan
  • 10. CYBER WAR • Cyber warfare is closely related to other aspects of cyber threats such as cyber crime, cyber terrorism, cyber espionage and cyber spying. • Cyber war also includes the development and implementation of security strategies to defend against such attack mechanisms. Rajeev Chauhan
  • 11. CYBER WAR • At least 12 of the world’s 15 largest military powers are currently building cyber warfare programs, according to James Lewis, a cyber security expert at the Center for Strategic and International Studies. • The US has had a major influence on the development of cyberspace by virtue of the fact that much of the initial infrastructure and use was centered in that country and it continues to be a major force in its development and use. Rajeev Chauhan
  • 12. CYBER WARFARE • Recce • Enum • Foot printing • System hacking/attack – DDos – Trojans/backdoors – Virus/Worms – Session hijacking • Maintain Contact • Remove traces Rajeev Chauhan
  • 13. CYBER WARFARE CAPABILITIES – China – US – UK – North Korea – Australia – Israel – Iran – Russia – Germany – Netherlands – India • Countries with capabilities to launch Cyber war Rajeev Chauhan
  • 15. CHINA • Admitted to having a dedicated Cyber War launching capabilities. • According to the cyber security firm Mandiant, the People’s Liberation Army (PLA) has been using an elite cyber warfare unit based in Shanghai to launch hundreds of cyber attacks targeting mainly American. • The unit, officially known as Unit 61398, operates under the PLA’s Second Bureau of the General Staff Department’s (GSD) Third Department. • The PLA’s Unit 61398 is known for its use of zero-day exploits. According to Mandiant, Unit 61398’s informal name was APT1 due to their skill at successfully carrying out advanced persistent threats. Rajeev Chauhan
  • 16. CHINA • China has “reached out” to people with the necessary cyber skills in the IT sector and academic community to help fill any gaps in state expertise and personnel when needed. • In October 2014, the FBI issued a warning that a Chinese hacking collective known as Axiom has been engaged in a sophisticated campaign to steal valuable data from U.S. government agencies. Rajeev Chauhan
  • 17. CHINA • Taiwan’s National Security Bureau (NSB) has identified another unit of the GSD’s Third Department that is involved in cyber- activities.(source Taipei Times) • China’s cyber capabilities are organized by a strategy involving “to establish information dominance.” • Information dominance refers to: – taking and maintaining control of an adversary’s access to its own information, and – disrupting the flow of information necessary for “decision-making or combat operations.” Rajeev Chauhan
  • 18. US Rajeev Chauhan Images: Copyright of respective owners
  • 19. US • United States Cyber Command (USCYBERCOM) is an armed forces sub-unified command subordinate to United States Strategic Command and centralizes command of cyberspace operations, organizes existing cyber resources and synchronizes defense of U.S. military networks. (wiki). • The Army Cyber Command (ARCYBER) is an Army component command for the U.S. Cyber Command: – Army Network Enterprise Technology Command / 9th Army Signal Command – Portions of 1st Information Operations Command (Land) – United States Army Intelligence and Security Command will be under the operational control of ARCYBER for cyber-related actionsRajeev Chauhan
  • 20. US • Marine Corps Forces Cyberspace Command • Navy Cyber Forces • Twenty-Fourth Air Force with following components – 67th Network Warfare Wing – 688th Information Operations Wing – 689th Combat Communications Wing • United States Tenth Fleet, consisting of – Naval Network Warfare Command – Navy Cyber Defense Operations Command – Naval Information Operation Commands – Combined Task Forces Rajeev Chauhan
  • 21. US • Cyberwarfare in the United States is the United States Cyber Command's military strategy of Proactive Cyber Defence and the use of cyber warfare as a platform for attack. • The five pillars is the framework for the United States military strategy for cyber warfare. – Cyberspace as new warfare domain – Proactive defense – Critical infra protection – Collective defense – Maintain and enhance the advantage of technological change Rajeev Chauhan
  • 23. UK • Britain will create a new cyber unit which will be known as the Joint Cyber Reserve.(2013) – will be tasked primarily with defending the UK against cyber attacks – will also have the capability to launch strikes where deemed necessary • Ministry of Defence (MoD) will be looking to employ hundreds of IT experts who will be responsible for defending the nation’s critical data and computer networks. • Cyber defences blocked around 400,000 advanced malicious cyber threats against the government’s secure internet alone Rajeev Chauhan
  • 24. UK • An Army unit, called the 77th Brigade, is set up to help fight the cyberwars of the future. – Made up from reservists as well as regulars from all three services of the armed forces. – The team is modelled on the Chindits, a specialist unit which fought in Burma during the Second World War. – “clinical cyber strikes” could be used to disable key military assets such as nuclear and chemical weapons, enemy communications and other tools of war. Rajeev Chauhan
  • 25. GCHQ (Government Communication Head Quarter) • GCHQ is an intelligence and security organisation, working to keep Britain safe and secure in the challenging environment of modern communications • GCHQ strives to ensure that life in the UK isn't compromised through cyber attack or on-line serious crime, employing some of the world's leading experts on Information Security (how do we work). • GCHQ and its sister agencies, MI5 and the Secret Intelligence Service, could not tackle the cyber challenges "at scale" without greater support from the private sector, including the largest US technology companies which dominate the web. Rajeev Chauhan
  • 27. NORTH KOREA • Cyber attacks like the one inflicted by the North Korean government on Sony are just the opening skirmishes before the outbreak of a hugely dangerous cyber war that is inevitable. • North Korea has natural cyber-defenses • Why? – it only has about 1,000 IP addresses, – it has only very few computers so its 'terrain' is very defensible. Rajeev Chauhan
  • 28. AUSTRALIA • Recent references in cooperation with US in spying on Asian countries, especially India. • Australian Signals Directorate with support from the Defence Science and Technology Organisation has developed new cyber offensive capabilities in 2014, to carryout, – DoS – Access, modify and Delete Data remotely – Dissemination of False Information – Penetration of FW protecting Avionics of targets, inserting Trojan Horses • Part of 5-Eye partners....US, UK, Canada, Australia and New Zealand. Rajeev Chauhan
  • 29. ISRAEL • IDF has announced in June – Establish a Cyber Command within two years. – Includes Military Intelligence and C4I Telecommunications division. • Contribute towards the overall IDF Cyber Potential. • Challenges would be to attain both long range planning and precise execution capabilities at different level with optimal degree of operational flexibility in both offensive and defensive theatre. • DMI’s 8200 signal intelligence unit was handling int collection and offensive missions, whereas C4I directorate was handling cyber defensive missions. Rajeev Chauhan
  • 30. ISRAEL • Salient points:- – The cyber command will be in charge of both the buildup and operational missions. – DMIs working in cyber space in conjunction with conventional intelligence gathering missions has not contributed to overall operational effectiveness. – Synergy between DMIs intelligence gathering and offensive setup with various cyber units. – Reciprocal data gathering and dissemination amongst other branches. – Maximum operational cooperation and coordination between New Command and other IDF forces and units – Coordination with civilian agencies like National Cyber Bureau and Cyber Authority.Rajeev Chauhan
  • 31. IRAN • Since November 2010, an organization called “The Cyber Defense Command” has been operating in Iran under the supervision of the country’s “Passive Civil Defense Organization” a subdivision of the Joint Staff of Iranian Armed Forces. • According to a 2014 report by Institute for National Security Studies, Iran is "one of the most active players in the international cyber arena“. • In June 2010, Iran was the victim of a cyber attack when its nuclear facility in Natanz was infiltrated by the cyber- worm ‘Stuxnet’. Thereafter it has learnt a lot and developed a potent cyber warfare capabilities. Rajeev Chauhan
  • 32. RUSSIA • It has been claimed that Russian security services organized a number of denial of service attacks as a part of their Cyber-warfare against other countries, most notably – 2007 cyber attacks on Estonia – 2008 cyber attacks on South Ossetia, Georgia, and Azerbaijan. • The Russian government had been fostering and financing the Nashi youth organization for more than years. Nashi members were involved in the Estonia cyber attacks of 2007, Georgian govt websites in 2008 and targeted individual Georgian supporters in 2009 Rajeev Chauhan
  • 33. RUSSIA • Since 2010, Russia like the U.S., China and other countries has made dual use information security research and development a top priority at dozens of top research institutes and universities. • At least twelve institutes provide world-class instruction to their graduates in dual use information security and electronic warfare technologies, who are then hired by the Security Services and Ministry of Defense for offensive and defensive operations. Rajeev Chauhan
  • 34. NETHERLAND • In the Netherlands Cyber Defense is nationally coordinated by the National Cyber Security Center (NCSC). • The Dutch Ministry of Defense laid out a cyber strategy in 2011. • The first focus is to improve the cyber defense handled by the Joint IT branch (JIVC). • Joint Sigint Cyber Unit (JSCU) has been setup with an aim to improve intel operations in the Netherlands (including the military intel organization MIVD) • The Ministry of Defense has set up an offensive cyber force, called Defense Cyber Command (DCC) Rajeev Chauhan
  • 35. GERMANY • In 2013, Germany admitted the existence of their 60- person Computer Network Operation unit. • The German intelligence agency, BND, announced that his agency had observed up to five attacks a day on government authorities, thought mainly to originate in China. • After Edward Snowden leaked details of the U.S. National Security Agency's cyber surveillance system, Germany announced that the BND would be given an additional budget of 100 million Euros to increase their cyber surveillance capability. Rajeev Chauhan
  • 36. INDIA: Why? • Cyber Attacks affecting national infrastructure through – Sensitive information leaks….Confidentiality – Malicious programs effecting critical operations and applications like power, communication etc….. – Denial of Services, bringing down critical financial and banking infrastructure….effecting their Availability. • Attack on availability of CII is grave in nature as it has direct impact on national assets and their functioning. • All types of threats to be addressed in any National Cyberspace Protection Policies and Procedures. Rajeev Chauhan
  • 37. INDIA: Where do we stand? • Indian Cyberspace subjected to frequent attacks by China, Pakistan, US, UK, Bangladesh, Anonymous • Cyber Security Policies …implementation? • Agencies..CERT-IN, NTRO, NCCC(National Cyber Coord Committee), NATGRID, NCIIPC • Potent offensive capabilities • Capability to sustain • Disaster management and continuity plan • Robustness of CII Rajeev Chauhan
  • 38. • Chinese are focused…are we! • Offensive and Defensive capability…. Rajeev Chauhan
  • 40. References 1. http://strategicstudyindia.blogspot.in/2014/02/cyber-warfare-and- information-security.html 2. http://thediplomat.com/2015/04/chinas-growing-cyberwar-capabilities/ 3. http://bhconsulting.ie/securitywatch/?p=1739 4. http://www.bbc.co.uk/newsbeat/article/31074227/the-internet-is-the- new-frontline-as-uk-sets-up-army-cyber-unit 5. https://en.wikipedia.org/wiki/United_States_Cyber_Command 6. http://www.esecurityplanet.com/network-security/cyber-war-is- hell.html?utm_source=dlvr.it&utm_medium=twitter 7. Australian Defence Review. 8. http://jeffreycarr.blogspot.in/2014/03/russian-cyber-warfare-capabilities- in.html 9. http://www.infoplease.com/world/events/cyberwar-timeline.html Rajeev Chauhan