Cyber space is being emerging as new domain of warfare. In fifth generation of warfare, it is more likely that the cyber power significantly affects the result of wars.
CryptoJacking and Security: Evolution of a HackBryan Becker
Bryan Becker's talk at the 2018 RMISC discussing the changing types of attacks focusing on "cryptojacking" and the future challenges for blockchain security.
Combating Cyber Security Using Artificial IntelligenceInderjeet Singh
Cyber Security & Data Protection India Summit 2018 aims to convene the best minds in Cybersecurity under one roof to create an interactive milieu for exchange of knowledge and ideas. The event will endeavour to address the emerging and continuing threats to Cybersecurity and its changing landscape, as well as respond to increasing risk of security breaches and security governance, application security, cloud based security, Network, Mobile and endpoint security and other cyber risks in the India and abroad.
This is a working document for presentation to Cyber Security Professionals concerning a tactical mindset in securing cyberspace within organizations. High level, can add in case studies, more content to come Dec 2010 for the European, UK and German presentation. Feel free to respond to add to brief. Requires Notes
The current presentation is based on different Cyber Security Threats for 2017 published in Internet. All threats are explained at a high level but at the end of this presentation all references URL are present if you want to investigate deeply any threat.
CryptoJacking and Security: Evolution of a HackBryan Becker
Bryan Becker's talk at the 2018 RMISC discussing the changing types of attacks focusing on "cryptojacking" and the future challenges for blockchain security.
Combating Cyber Security Using Artificial IntelligenceInderjeet Singh
Cyber Security & Data Protection India Summit 2018 aims to convene the best minds in Cybersecurity under one roof to create an interactive milieu for exchange of knowledge and ideas. The event will endeavour to address the emerging and continuing threats to Cybersecurity and its changing landscape, as well as respond to increasing risk of security breaches and security governance, application security, cloud based security, Network, Mobile and endpoint security and other cyber risks in the India and abroad.
This is a working document for presentation to Cyber Security Professionals concerning a tactical mindset in securing cyberspace within organizations. High level, can add in case studies, more content to come Dec 2010 for the European, UK and German presentation. Feel free to respond to add to brief. Requires Notes
The current presentation is based on different Cyber Security Threats for 2017 published in Internet. All threats are explained at a high level but at the end of this presentation all references URL are present if you want to investigate deeply any threat.
This is a summary of what cyber crime is all about, the history of cyber crime; motivation behind cyber attack as well as the various techniques used in committing those crimes; Cybercrime groups starting to operate like the Mafia; how cyber crimes exploits Web2.0 opportunites and Top Computer Secuity Actions.
Cybersecurity for Critical National InfrastructureDr David Probert
Presentation focuses on National Cybersecurity Strategies, Models and Plans. These include the well known UN/ITU - International Telecommunication Union Strategy Guidelines which were updated this year. The talk includes the authors security missions to Armenia and Georgia as well as industrial ICS/SCADA security and the critical info sectors. We briefly review national cybersecurity legislation as well as standards and cyber skills requirements. We wrap up with a cyber "Shopping List" , Business Action Plan & Conceptual RoadMap. This presentation was given on the 6th November 2018 at the 38th East-West Security Conference in Nice, France! Enjoy!
Cybersecurity concepts & Defense best practisesWAJAHAT IQBAL
This presentation is an attempt to present the complex Subject of Cybersecurity in a concise format with main focus to present the core of Cybersecurity and best practises and standards to protect an enterprise Network.Comments of readers welcomed.Thank You (Wajahat Iqbal)
Email: Wajahat_Iqbal@yahoo.com
Cyber security is an essential part of our digital lives today. But do you know what cyber security actually constitutes and how secure you really are? In this presentation, we help you understand:
a. The impact of cyber security on our digital lives
b. How cyber security is essential for our families
c. Cyber security in the business context
d. What Quick Heal can do to help
Recently, NTT published the Global Threat Intelligence Report 2016 (GTIR). This year’s report focused both on the changes in threat trends and on how security organizations around the world can use the kill chain to help defend the enterprise.
Turning threat intelligence data from multiple sources into actionable, contextual information is a challenge faced by many organizations today. The Global Threat Intelligence Platform provides increased efficiency, reduces risks and focuses on global coverage with accurate and up-to-date threat intelligence.
This presentation was given at Carnegie Mellon University by Kenji Takahashi, VP of Product Management, Security at NTT Innovation Institute.
100+ Cyber Security Interview Questions and Answers in 2022Temok IT Services
Top 100 Cyber Security Interview Questions and Answers in 2022 According to the IBM Report, data breaches cost measured businesses $4.24 million per incident on average, the highest in the 17 years of history. However, the demand for cyber security professionals exceeded and created exciting job opportunities.
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...Edureka!
** Cyber Security Course: https://www.edureka.co/cybersecurity-certification-training **
This Edureka tutorial on "What is Cyber Security" gives an introduction to the Cyber Security world and talks about its basic concepts. You get to know different kinds of attack in today's IT world and how cybersecurity is the solution to these attacks. Below are the topics covered in this tutorial:
1. Why we need Cyber Security?
2. What is Cyber Security?
3. The CIA Triad
4. Vulnerability, Threat and Risk
5. Cognitive Cyber Security
Cybersecurity Training Playlist: https://bit.ly/2NqcTQV
Conceito militar, agora aplicado a Cibersegurança, o "the cyber kill chain" foi desenvolvido pela Lockheed Martin em 2011. Ele descreve as fases que um adversário seguirá para alvejar uma Organização. São 7 fases bem definidas e este ataque é considerado bem sucedido
se / quando todas as fases foram realizadas.
(DOCUMENTO EM INGLÊS)
Cognitive Computing: Company presentation by Tomer Weingarten, Co-Founder & CEO of SentinelOne at the NOAH Conference 2019 in Tel Aviv, Hangar 11, 10-11 April 2019.
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015Priyanka Aash
Amid privacy concerns and after a decade-long battle, the U.S. Cybersecurity Information Sharing Act (CISA) of 2015 was passed. Critics claim CISA is a surveillance bill in disguise; proponents claim the act provides a needed legal framework for information sharing. Can CISA actually improve cyberdefense without risking privacy? Are there unforeseen roadblocks? What about STIX/TAXII?
(Source: RSA USA 2016-San Francisco)
CYBERWAR IS NOT A CONVENTIONAL WAR. NATIONS ARE YET TO ENTER INTO ANY INTERNATIONAL TREATY IN THE FIELD OF CYBERWAR. RULES ARE REQUIRED TO BE FRAMED IN THIS FIELD KEEPING IN VIEW THE POTENTIAL OF DAMAGE WHICH CAN BE CAUSED IN THE EVENT OF CYBERWAR.
This is a summary of what cyber crime is all about, the history of cyber crime; motivation behind cyber attack as well as the various techniques used in committing those crimes; Cybercrime groups starting to operate like the Mafia; how cyber crimes exploits Web2.0 opportunites and Top Computer Secuity Actions.
Cybersecurity for Critical National InfrastructureDr David Probert
Presentation focuses on National Cybersecurity Strategies, Models and Plans. These include the well known UN/ITU - International Telecommunication Union Strategy Guidelines which were updated this year. The talk includes the authors security missions to Armenia and Georgia as well as industrial ICS/SCADA security and the critical info sectors. We briefly review national cybersecurity legislation as well as standards and cyber skills requirements. We wrap up with a cyber "Shopping List" , Business Action Plan & Conceptual RoadMap. This presentation was given on the 6th November 2018 at the 38th East-West Security Conference in Nice, France! Enjoy!
Cybersecurity concepts & Defense best practisesWAJAHAT IQBAL
This presentation is an attempt to present the complex Subject of Cybersecurity in a concise format with main focus to present the core of Cybersecurity and best practises and standards to protect an enterprise Network.Comments of readers welcomed.Thank You (Wajahat Iqbal)
Email: Wajahat_Iqbal@yahoo.com
Cyber security is an essential part of our digital lives today. But do you know what cyber security actually constitutes and how secure you really are? In this presentation, we help you understand:
a. The impact of cyber security on our digital lives
b. How cyber security is essential for our families
c. Cyber security in the business context
d. What Quick Heal can do to help
Recently, NTT published the Global Threat Intelligence Report 2016 (GTIR). This year’s report focused both on the changes in threat trends and on how security organizations around the world can use the kill chain to help defend the enterprise.
Turning threat intelligence data from multiple sources into actionable, contextual information is a challenge faced by many organizations today. The Global Threat Intelligence Platform provides increased efficiency, reduces risks and focuses on global coverage with accurate and up-to-date threat intelligence.
This presentation was given at Carnegie Mellon University by Kenji Takahashi, VP of Product Management, Security at NTT Innovation Institute.
100+ Cyber Security Interview Questions and Answers in 2022Temok IT Services
Top 100 Cyber Security Interview Questions and Answers in 2022 According to the IBM Report, data breaches cost measured businesses $4.24 million per incident on average, the highest in the 17 years of history. However, the demand for cyber security professionals exceeded and created exciting job opportunities.
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...Edureka!
** Cyber Security Course: https://www.edureka.co/cybersecurity-certification-training **
This Edureka tutorial on "What is Cyber Security" gives an introduction to the Cyber Security world and talks about its basic concepts. You get to know different kinds of attack in today's IT world and how cybersecurity is the solution to these attacks. Below are the topics covered in this tutorial:
1. Why we need Cyber Security?
2. What is Cyber Security?
3. The CIA Triad
4. Vulnerability, Threat and Risk
5. Cognitive Cyber Security
Cybersecurity Training Playlist: https://bit.ly/2NqcTQV
Conceito militar, agora aplicado a Cibersegurança, o "the cyber kill chain" foi desenvolvido pela Lockheed Martin em 2011. Ele descreve as fases que um adversário seguirá para alvejar uma Organização. São 7 fases bem definidas e este ataque é considerado bem sucedido
se / quando todas as fases foram realizadas.
(DOCUMENTO EM INGLÊS)
Cognitive Computing: Company presentation by Tomer Weingarten, Co-Founder & CEO of SentinelOne at the NOAH Conference 2019 in Tel Aviv, Hangar 11, 10-11 April 2019.
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015Priyanka Aash
Amid privacy concerns and after a decade-long battle, the U.S. Cybersecurity Information Sharing Act (CISA) of 2015 was passed. Critics claim CISA is a surveillance bill in disguise; proponents claim the act provides a needed legal framework for information sharing. Can CISA actually improve cyberdefense without risking privacy? Are there unforeseen roadblocks? What about STIX/TAXII?
(Source: RSA USA 2016-San Francisco)
CYBERWAR IS NOT A CONVENTIONAL WAR. NATIONS ARE YET TO ENTER INTO ANY INTERNATIONAL TREATY IN THE FIELD OF CYBERWAR. RULES ARE REQUIRED TO BE FRAMED IN THIS FIELD KEEPING IN VIEW THE POTENTIAL OF DAMAGE WHICH CAN BE CAUSED IN THE EVENT OF CYBERWAR.
Cyber Operations in Smart Megacities: TechNet Augusta 2015AFCEA International
Eric Bassel
SANS Director
SANS Institute
There has been a great deal of research about the future of warfare and it seems clear that the US Military’s strategy is intimately tied to highly-interconnected Megacities where over 80% of the world’s population currently resides.
Oil and Gas iQ’s Cyber Security for Oil and Gas event will bring together relevant stakeholders to discuss the most pressing cyber security issues facing the oil and gas sector. Presentations will examine threat trends, identify immediate and long-term needs, and reveal up-and-coming technologies for use in evolving threat environments. Security managers, IT strategy implementers, and industry partners will gather in Houston, TX to network, share best practices and explore potential paths to mitigate the threat of energy-focused attacks from cyber adversaries. For more information visit http://bit.ly/1cwasCO
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...Boston Global Forum
This conference was an official event to establish the Global Citizenship Education Network (GCEN) between UNESCO, UCLA and the Boston Global Forum (BGF) . We had several important dialogues concerning Global Citizenship Education in Cyber Civil Defense
CYBERSPACE
CYBER POWER
INTERNET
CYBER-ATTACK
INDIA AND PAKISTAN CYBER ATTACKS
TYPES OF CYBER CRIME
Hypotheses in the Research
Literature on the Influence of Mass Media on Criminal Behavior
Technology-Related Risk Factors for Criminal Behavior
COPYCAT CRIME:
CYBER SECURITY
SAFETY TIPS FOR CYBER CRIME
_Cyberspace_ Security and Future Challenges in the Digital World.pdfmbmh111980
"Cyberspace: Security and Future Challenges in the Digital World" provides an insightful exploration of the evolving landscape of cybersecurity, examining current security measures and anticipating future challenges in an increasingly interconnected digital environment.
Similar to Cyber power affects war outcomes in modern era (20)
Geology is the one of the most interesting subject about mother earth which can be best studied on field. This report of geological field work done at Chobhar area, Kathmandu consists observation with analysis regarding geological features, structures and processes.
This article briefly discusses on the concept of human security, its dimensions and challenges. The concept of human security is the paradigm shift from state-centered traditional notion of security to individual-centered idea focusing on protection, dignity and sustainable development. In brief it freedom from fear, freedom from want and beyond.
Anthropological study to disaster management is the new and holistic approach. It helps to explore the synergistic relation of anthropology and disaster.
The formation and deformation of earth's crust. The lithosphere is not a homogeneous unit. It is divided in to multiple plates. The internal heat process, the convection process affects the plate tectonics.
Mao tse tung a transformational leader and his guerilla warBhadra Thakuri
Mao Tse Tung as a transformation leader who is credited for the creation of modern PRC from agrarian and semi-feudal China. He deserved charisma, vision, strong conviction as well as commitment. He was the multi-dimensional personality. He served as an revolutionary soldier, teacher, leader and a poet.
Philosophical dimensions of research with caseBhadra Thakuri
Sound research stands on the balanced combination of philosophy, methodology and rhetoric. This slide covers the philosophical trinity of research- the epistemology, ontology and the axiology, the body, mind and the soul part of research respectively.
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Orkestra
UIIN Conference, Madrid, 27-29 May 2024
James Wilson, Orkestra and Deusto Business School
Emily Wise, Lund University
Madeline Smith, The Glasgow School of Art
Have you ever wondered how search works while visiting an e-commerce site, internal website, or searching through other types of online resources? Look no further than this informative session on the ways that taxonomies help end-users navigate the internet! Hear from taxonomists and other information professionals who have first-hand experience creating and working with taxonomies that aid in navigation, search, and discovery across a range of disciplines.
This presentation by Morris Kleiner (University of Minnesota), was made during the discussion “Competition and Regulation in Professions and Occupations” held at the Working Party No. 2 on Competition and Regulation on 10 June 2024. More papers and presentations on the topic can be found out at oe.cd/crps.
This presentation was uploaded with the author’s consent.
This presentation, created by Syed Faiz ul Hassan, explores the profound influence of media on public perception and behavior. It delves into the evolution of media from oral traditions to modern digital and social media platforms. Key topics include the role of media in information propagation, socialization, crisis awareness, globalization, and education. The presentation also examines media influence through agenda setting, propaganda, and manipulative techniques used by advertisers and marketers. Furthermore, it highlights the impact of surveillance enabled by media technologies on personal behavior and preferences. Through this comprehensive overview, the presentation aims to shed light on how media shapes collective consciousness and public opinion.
0x01 - Newton's Third Law: Static vs. Dynamic AbusersOWASP Beja
f you offer a service on the web, odds are that someone will abuse it. Be it an API, a SaaS, a PaaS, or even a static website, someone somewhere will try to figure out a way to use it to their own needs. In this talk we'll compare measures that are effective against static attackers and how to battle a dynamic attacker who adapts to your counter-measures.
About the Speaker
===============
Diogo Sousa, Engineering Manager @ Canonical
An opinionated individual with an interest in cryptography and its intersection with secure software development.
Acorn Recovery: Restore IT infra within minutesIP ServerOne
Introducing Acorn Recovery as a Service, a simple, fast, and secure managed disaster recovery (DRaaS) by IP ServerOne. A DR solution that helps restore your IT infra within minutes.
2. AIM
To highlight on the findings of cyber power
and its effects in modern era warfare
3. SEQUENCE OF PRESENTATION
INTRODUCTION
REVIEW OF LITERATURE/ RESEARCH METHODOLOGY
DYNAMICS OF MODERN ERA WARFARE
CYBER SPACE AN EMERGING DOMAIN OF WARFARE
CYBER THREATS TO NATIONAL SECURITY
CYBER SECURITY STATUS IN NEPAL
CYBER POWER & WAR OUTCOMES IN MODERN ERA
FINDINGS, CONCLUSION AND RECOMMENDATIONS
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
4. “The Cyber Battlefield is real.
It’s a place where computers
are used instead of guns,
data packets instead of
bullets, and firewalls are used
instead of barbed wire”
- RICHARD TRACY
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
5. INTRODUCTION
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
War fighting domain,
means and method are
changing and being
more complex with the
time and technological
advancement
Cyber space is emerging
as new domain of warfare
which is vast, virtual and
complex
Superior cyber capability
can dominate
adversaries in modern
warfare
Use of cyber without
adequate security
measures threatens
internal and global
security
Nepal as a developing
country the use of
computer is proliferated
in Multi sectors
Cyber power shapes
war outcomes in
modern era
Many Nations are
building cyber
capability and are in
quest of cyber power
6. STATEMENT OF THE PROBLEM
What is the role of cyber power in modern warfare?
What are the threats to national security via cyber space?
How does cyber affect war outcomes in modern era?
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
7. To describe the role of cyber power in modern warfare
To document the threats to national security via cyber space
To examine the effects of cyber power in modern era warfare
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
OBJECTIVES OF THE STUDY
8. METHOD/ LIMITATIONS
Research Method
Qualitative Approach
Explorative & Descriptive Method
Case Study
Office Visit & Interview
Subject Limitations
Focus on effects of cyber power in warfare
Secondary data
Key actor’s future actions are out of reach
What next in technology is difficult to predict
Cyber security status in Nepal as example of developing country
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
9. REVIEW OF THE LITERATURE
Modern Warfare : Understanding Modern Warfare
Information Warfare : Global Information Warfare: How Businesses,
Governments, and Others Achieve Objectives and Attain Competitive
Advantages
Cyber Space : Cyberspaces and Global Affairs
Cyber space and National Security: Threats, Opportunities and Power in
a Virtual World
The New Digital Age: Reshaping the Future of People, Nations and Business
Cyber Warfare : Cyber Warfare: Techniques, Tactics and Tools for Security
Practitioners
Cyber Security : Cyber security: What Everyone Needs to Know
Mitigating the Local and Global Challenges of Cyber Security
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
10. • Aerial warfare
• Asymmetric warfare
• Biological warfare
• Chemical warfare
• Electronic warfare
• Land warfare
• Guerrilla warfare
• Use of Propaganda
• Psychological actions
• Information Warfare
• Naval warfare
• Network-centric warfare
• Nuclear war
• Space warfare
DYNAMICS
OF MODERN
WARFARE
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
11. CYBERSPACE AN EMERGING DOMAIN OF WARFARE
CYBER WARFARE
SEA
AERO
SPACE
LAND
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
OUTER
SPACE
12. Penetration to
enemy system to
obtain information
Disruption of C
and C system
General disruption
through viruses
Selective disruption
Disruption at some
particular time frame
FORMS OF CYBER WARFARE
Espionage
and national
security
breaches
Sabotage
Hacker warfare
Computer Viruses
Worms
Trojan Horses
Logic Bombs
Trap Doors
Chipping
13. Distinct
Features
of Cyber
warfare
Non-physical
domain and no
demarcated
boundaries
Enable
actors
without
employing
armed
forces
Disproportionate
power to
relatively
insignificant
actorsOperating
behind false
IP address
Boundaries
are blurred
between the
military and
civilian
Power can
be exerted
by state or
non state
actors
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
14. As Extension of
politics
Impact on
Military Mission/
Campaign
Cyber at
strategic and
operational
level
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
CYBERSPACE AN EMERGING DOMAIN OF WARFARE…
15. Cyber
Vulnerabilities
Cyber Intrusion
Cyber
Exploitation
Cyber Espionage
Cyber theft
Cyber Attack
Cyber
Security
Building Cyber
Resilient force
Building Cyber Offensive
capabilities
Joint Cyber
Security Cell
CYBER THREATS TO NATIONAL SECURITY
Essential Fundamentals
for Protection from
Cyber threat
Increased
protection
against cyber
attack
The capability
to detect when
an attack is
taking place
The potential to
react or
recover when
an attack is
detected
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
16. New global economy
has increased the
spread of computer
systems
Third world countries are in a
position to use computer
systems which can possibly
threaten global securityMilitary units should be
trained specifically to
exploit enemy
vulnerabilities
Use the new team to
gather intelligence,
disseminate warnings
and indications
Provide authorities
With intelligence on
the new threats
to national security
Educate civilian and
military personnel from
top to bottom on
IW threats
DEVELOPING
COUNTRIES
AND CYBER
Computer technology is
being rapidly proliferated
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
17. • Application of GIS
• E-Governance Initiatives
• Cyber Security Emergency
Response Team
• Legal Provisions
•Electronic Transaction Act
2008
•IT Policy 2000
• Cyber Crime Investigation
Process
IT INITIATIVES &
CYBER SECURITY
PROVISION IN
NEPAL
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
CYBER SECURITY STATUS IN NEPAL
18. 1955 1960 1970 1975 1985
Invasion
Computer
Cruise Missile
GIS APPLICATIONS OF NA IN TRACKING SYSTEM
1945 TodayMobile Comm
Nepal Army Patrol
GPS Satellites
GPS Reading
GPS Reading Send
Via GPRS
GPS Reading Send
Via GPRS
Nepal Army HQ
Application of GIS
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
19. E- Governance
Initiatives
Legal Provisions
•Electronic
Transaction Act 2008
•IT Policy 2000
Cyber Security
Emergency Response
Team
Cyber Crime
Investigation
Process in Nepal
Formulated in 2006
Digital National
Identity Card
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
EXISTING CYBER SECURITY PROVISION IN NEPAL
• Information and Evidence Collection
• Case Analysis
• Arrest Offender
• Documentation
• Prosecution
ITSERT-NP
• First Information Record
• Co-ordinate with Informer or Victim
• Information Analysis and Verification
• Police Deployment
20. Computer as a Tool
Computer as a Target
CYBER
CRIMES
IN NEPAL• Financial Crimes
• Cyber Pornography
• Sale of Illegal Articles
• Online Gambling
• Intellectual Property Crimes
• Email Spoofing
• Forgery
• Cyber Defamation
• Cyber Stalking
• Unauthorized Access to Computer Systems or Networks
• Theft of Information Contained in Electronic Form
• Email Bombing
• Data Diddling
• Salami Attacks
• Virus / Worm Attacks
• Denial of Service Attack
• Logic Bombs
• Internet Time Thefts
• Trojan Attacks
• Web Jacking
• Theft of Computer System
• Physically damaging a computer system
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
22. METHODS OF PROTECTING CYBER SYSTEM
Use of Firewalls
Anti Virus
Do not open
unknown email
Turn off/
disconnect
computer when
not in use
Disable hidden
filename
extension
Do not run
programs of
unknown origin
Disable scripting
features in email
programs
Make regular
backup of
critical data
Keep all
applications
patched
23. The Evolution of USCYBERCOM
The People’s Republic of China
The Islamic Republic of Iran
Russia
North Korea
CYBER POWER AND WAR OUTCOMES IN MODERN ERA
Quest of Cyber Power by Key Players
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
24. CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
CHARACTERISTICS OF CYBER POWER
Complementary instruments of power when used autonomously
Cheaper and very low entry cost
Easy to deliver with stealth from anywhere
Difficult to trace the origin of an attack
Ability to disrupt the adversary than destroying the forces
No need to engage in combat operations/ Less or no bloodshed
Favors the attacker
25. CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
EFFECTS OF CYBER POWER ON MODERN WARFARE
Relations between states and non-state actors
Stealth makes it attractive to many users
Indispensable element of modern technology- based military capability
Key lever in the development and execution of national policy
Achieve political and strategic goal without armed conflict
Gives disproportionate power to small and insignificant actors
Boundaries are blurred between military and civilian/physical & virtual
power
Speedy attack
26. •Cyber technology has emerged
as invariable feature of modern
life
•Cyber space- vast, complex
and rapidly changing battle
space having no physical
boundary
•Cyber power is the COG of
globalized world
•Cyber weapons are versatile
•Small attack offers force
multiplier
•Complementary status may
change to decisive and
catastrophic at any time
• Existing cyber security
provision in Nepal is not
sufficient hence awareness
of users is necessary
• Difficult to determine the
defensive posture
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
FINDINGS