SlideShare a Scribd company logo
CYBER POWER AFFECTS WAR
OUTCOMES IN MODERN ERA
BHADRA BAHADUR SINGH THAKURI
AIM
To highlight on the findings of cyber power
and its effects in modern era warfare
SEQUENCE OF PRESENTATION
INTRODUCTION
REVIEW OF LITERATURE/ RESEARCH METHODOLOGY
DYNAMICS OF MODERN ERA WARFARE
CYBER SPACE AN EMERGING DOMAIN OF WARFARE
CYBER THREATS TO NATIONAL SECURITY
CYBER SECURITY STATUS IN NEPAL
CYBER POWER & WAR OUTCOMES IN MODERN ERA
FINDINGS, CONCLUSION AND RECOMMENDATIONS
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
“The Cyber Battlefield is real.
It’s a place where computers
are used instead of guns,
data packets instead of
bullets, and firewalls are used
instead of barbed wire”
- RICHARD TRACY
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
INTRODUCTION
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
War fighting domain,
means and method are
changing and being
more complex with the
time and technological
advancement
Cyber space is emerging
as new domain of warfare
which is vast, virtual and
complex
Superior cyber capability
can dominate
adversaries in modern
warfare
Use of cyber without
adequate security
measures threatens
internal and global
security
Nepal as a developing
country the use of
computer is proliferated
in Multi sectors
Cyber power shapes
war outcomes in
modern era
Many Nations are
building cyber
capability and are in
quest of cyber power
STATEMENT OF THE PROBLEM
 What is the role of cyber power in modern warfare?
 What are the threats to national security via cyber space?
 How does cyber affect war outcomes in modern era?
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
To describe the role of cyber power in modern warfare
To document the threats to national security via cyber space
To examine the effects of cyber power in modern era warfare
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
OBJECTIVES OF THE STUDY
METHOD/ LIMITATIONS
Research Method
 Qualitative Approach
Explorative & Descriptive Method
Case Study
Office Visit & Interview
Subject Limitations
Focus on effects of cyber power in warfare
Secondary data
 Key actor’s future actions are out of reach
 What next in technology is difficult to predict
 Cyber security status in Nepal as example of developing country
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
REVIEW OF THE LITERATURE
 Modern Warfare : Understanding Modern Warfare
 Information Warfare : Global Information Warfare: How Businesses,
Governments, and Others Achieve Objectives and Attain Competitive
Advantages
 Cyber Space : Cyberspaces and Global Affairs
Cyber space and National Security: Threats, Opportunities and Power in
a Virtual World
The New Digital Age: Reshaping the Future of People, Nations and Business
 Cyber Warfare : Cyber Warfare: Techniques, Tactics and Tools for Security
Practitioners
 Cyber Security : Cyber security: What Everyone Needs to Know
Mitigating the Local and Global Challenges of Cyber Security
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
• Aerial warfare
• Asymmetric warfare
• Biological warfare
• Chemical warfare
• Electronic warfare
• Land warfare
• Guerrilla warfare
• Use of Propaganda
• Psychological actions
• Information Warfare
• Naval warfare
• Network-centric warfare
• Nuclear war
• Space warfare
DYNAMICS
OF MODERN
WARFARE
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
CYBERSPACE AN EMERGING DOMAIN OF WARFARE
CYBER WARFARE
SEA
AERO
SPACE
LAND
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
OUTER
SPACE
Penetration to
enemy system to
obtain information
Disruption of C
and C system
General disruption
through viruses
Selective disruption
Disruption at some
particular time frame
FORMS OF CYBER WARFARE
Espionage
and national
security
breaches
 Sabotage
 Hacker warfare
 Computer Viruses
 Worms
 Trojan Horses
 Logic Bombs
 Trap Doors
 Chipping
Distinct
Features
of Cyber
warfare
Non-physical
domain and no
demarcated
boundaries
Enable
actors
without
employing
armed
forces
Disproportionate
power to
relatively
insignificant
actorsOperating
behind false
IP address
Boundaries
are blurred
between the
military and
civilian
Power can
be exerted
by state or
non state
actors
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
As Extension of
politics
Impact on
Military Mission/
Campaign
Cyber at
strategic and
operational
level
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
CYBERSPACE AN EMERGING DOMAIN OF WARFARE…
Cyber
Vulnerabilities
Cyber Intrusion
Cyber
Exploitation
Cyber Espionage
Cyber theft
Cyber Attack
Cyber
Security
Building Cyber
Resilient force
Building Cyber Offensive
capabilities
Joint Cyber
Security Cell
CYBER THREATS TO NATIONAL SECURITY
Essential Fundamentals
for Protection from
Cyber threat
Increased
protection
against cyber
attack
The capability
to detect when
an attack is
taking place
The potential to
react or
recover when
an attack is
detected
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
New global economy
has increased the
spread of computer
systems
Third world countries are in a
position to use computer
systems which can possibly
threaten global securityMilitary units should be
trained specifically to
exploit enemy
vulnerabilities
Use the new team to
gather intelligence,
disseminate warnings
and indications
Provide authorities
With intelligence on
the new threats
to national security
Educate civilian and
military personnel from
top to bottom on
IW threats
DEVELOPING
COUNTRIES
AND CYBER
Computer technology is
being rapidly proliferated
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
• Application of GIS
• E-Governance Initiatives
• Cyber Security Emergency
Response Team
• Legal Provisions
•Electronic Transaction Act
2008
•IT Policy 2000
• Cyber Crime Investigation
Process
IT INITIATIVES &
CYBER SECURITY
PROVISION IN
NEPAL
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
CYBER SECURITY STATUS IN NEPAL
1955 1960 1970 1975 1985
Invasion
Computer
Cruise Missile
GIS APPLICATIONS OF NA IN TRACKING SYSTEM
1945 TodayMobile Comm
Nepal Army Patrol
GPS Satellites
GPS Reading
GPS Reading Send
Via GPRS
GPS Reading Send
Via GPRS
Nepal Army HQ
Application of GIS
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
E- Governance
Initiatives
Legal Provisions
•Electronic
Transaction Act 2008
•IT Policy 2000
Cyber Security
Emergency Response
Team
Cyber Crime
Investigation
Process in Nepal
Formulated in 2006
Digital National
Identity Card
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
EXISTING CYBER SECURITY PROVISION IN NEPAL
• Information and Evidence Collection
• Case Analysis
• Arrest Offender
• Documentation
• Prosecution
ITSERT-NP
• First Information Record
• Co-ordinate with Informer or Victim
• Information Analysis and Verification
• Police Deployment
Computer as a Tool
Computer as a Target
CYBER
CRIMES
IN NEPAL• Financial Crimes
• Cyber Pornography
• Sale of Illegal Articles
• Online Gambling
• Intellectual Property Crimes
• Email Spoofing
• Forgery
• Cyber Defamation
• Cyber Stalking
• Unauthorized Access to Computer Systems or Networks
• Theft of Information Contained in Electronic Form
• Email Bombing
• Data Diddling
• Salami Attacks
• Virus / Worm Attacks
• Denial of Service Attack
• Logic Bombs
• Internet Time Thefts
• Trojan Attacks
• Web Jacking
• Theft of Computer System
• Physically damaging a computer system
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
IO
N
Precautionary
Measures
Cyber Crime
Investigation Body
Cyber Security in Nepal
Monitoring
Mechanism
Cyber Security
Policy
NEED OF CYBER SECURITY IN NEPAL
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
Provision of CERT
METHODS OF PROTECTING CYBER SYSTEM
Use of Firewalls
Anti Virus
Do not open
unknown email
Turn off/
disconnect
computer when
not in use
Disable hidden
filename
extension
Do not run
programs of
unknown origin
Disable scripting
features in email
programs
Make regular
backup of
critical data
Keep all
applications
patched
The Evolution of USCYBERCOM
The People’s Republic of China
The Islamic Republic of Iran
Russia
North Korea
CYBER POWER AND WAR OUTCOMES IN MODERN ERA
Quest of Cyber Power by Key Players
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
CHARACTERISTICS OF CYBER POWER
Complementary instruments of power when used autonomously
Cheaper and very low entry cost
Easy to deliver with stealth from anywhere
Difficult to trace the origin of an attack
Ability to disrupt the adversary than destroying the forces
No need to engage in combat operations/ Less or no bloodshed
 Favors the attacker
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
EFFECTS OF CYBER POWER ON MODERN WARFARE
Relations between states and non-state actors
Stealth makes it attractive to many users
 Indispensable element of modern technology- based military capability
Key lever in the development and execution of national policy
Achieve political and strategic goal without armed conflict
Gives disproportionate power to small and insignificant actors
Boundaries are blurred between military and civilian/physical & virtual
power
Speedy attack
•Cyber technology has emerged
as invariable feature of modern
life
•Cyber space- vast, complex
and rapidly changing battle
space having no physical
boundary
•Cyber power is the COG of
globalized world
•Cyber weapons are versatile
•Small attack offers force
multiplier
•Complementary status may
change to decisive and
catastrophic at any time
• Existing cyber security
provision in Nepal is not
sufficient hence awareness
of users is necessary
• Difficult to determine the
defensive posture
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
FINDINGS
RECOMMENDATIONS
Opportunity
CERT
Training
Knowledge
Awareness
Formulation of cyber warfare strategy/
Cyber security body
Establishment of Digital Forensic
Enforcement of cyber law/
Institutions to produce
human resources in IT
Air gap/Maintaining
backup of critical data
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
CONCLUSION
Need of
secured
cyber
space in
Nepal
Paradigm
shift in
Warfare
Changing
realm of
National
security
CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
THANK YOU !
QUESTIONS !

More Related Content

What's hot

Cyber security and AI
Cyber security and AICyber security and AI
Cyber security and AI
DexterJanPineda
 
Endpoint Security
Endpoint SecurityEndpoint Security
Endpoint Security
Ahmed Hashem El Fiky
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
sweetpeace1
 
Cybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureCybersecurity for Critical National Infrastructure
Cybersecurity for Critical National Infrastructure
Dr David Probert
 
Cyber security
Cyber securityCyber security
Cyber security
Pihu Goel
 
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practises
WAJAHAT IQBAL
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Quick Heal Technologies Ltd.
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
NTT Innovation Institute Inc.
 
Cyber security
Cyber securityCyber security
Cyber security
Shivaani srinivas iyer
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
Temok IT Services
 
Cyber security from military point of view
Cyber security from military point of viewCyber security from military point of view
Cyber security from military point of view
S.E. CTS CERT-GOV-MD
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Edureka!
 
Addressing the cyber kill chain
Addressing the cyber kill chainAddressing the cyber kill chain
Addressing the cyber kill chain
Symantec Brasil
 
cyber security
cyber securitycyber security
cyber security
BasineniUdaykumar
 
Data Classification Presentation
Data Classification PresentationData Classification Presentation
Data Classification PresentationDerroylo
 
SentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel AvivSentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel Aviv
NOAH Advisors
 
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
Priyanka Aash
 
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Falgun Rathod
 
PPT-Security-for-Management.pptx
PPT-Security-for-Management.pptxPPT-Security-for-Management.pptx
PPT-Security-for-Management.pptx
RSAArcher
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
Sunny Sundeep
 

What's hot (20)

Cyber security and AI
Cyber security and AICyber security and AI
Cyber security and AI
 
Endpoint Security
Endpoint SecurityEndpoint Security
Endpoint Security
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureCybersecurity for Critical National Infrastructure
Cybersecurity for Critical National Infrastructure
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practises
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
 
Cyber security
Cyber securityCyber security
Cyber security
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
 
Cyber security from military point of view
Cyber security from military point of viewCyber security from military point of view
Cyber security from military point of view
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Addressing the cyber kill chain
Addressing the cyber kill chainAddressing the cyber kill chain
Addressing the cyber kill chain
 
cyber security
cyber securitycyber security
cyber security
 
Data Classification Presentation
Data Classification PresentationData Classification Presentation
Data Classification Presentation
 
SentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel AvivSentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel Aviv
 
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
 
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
 
PPT-Security-for-Management.pptx
PPT-Security-for-Management.pptxPPT-Security-for-Management.pptx
PPT-Security-for-Management.pptx
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
 

Similar to Cyber power affects war outcomes in modern era

In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
Pukhraj Singh
 
RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWAR
Talwant Singh
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
Ajay Serohi
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national securityTalwant Singh
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
Mehdi Poustchi Amin
 
Cyber weapons 1632578286
Cyber weapons 1632578286Cyber weapons 1632578286
Cyber weapons 1632578286
Udaysharma3
 
Cyberwarfare and Aggressiveness in Cyberspace
Cyberwarfare and Aggressiveness in CyberspaceCyberwarfare and Aggressiveness in Cyberspace
Cyberwarfare and Aggressiveness in Cyberspace
Jarno Limnéll
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Abdul Rehman
 
USSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert LinUSSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert Lin
AFCEA International
 
Cyber Operations in Smart Megacities: TechNet Augusta 2015
Cyber Operations in Smart Megacities: TechNet Augusta 2015Cyber Operations in Smart Megacities: TechNet Augusta 2015
Cyber Operations in Smart Megacities: TechNet Augusta 2015
AFCEA International
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
Maira Asif
 
C3 Cyber
C3 CyberC3 Cyber
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas
mariaidga
 
Crim cybersecurity_jarno_limnéll
Crim cybersecurity_jarno_limnéllCrim cybersecurity_jarno_limnéll
Crim cybersecurity_jarno_limnéll
Jarno Limnéll
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
Boston Global Forum
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
Shubhrat Mishra
 
Cyberwar: (R)evolution?
Cyberwar: (R)evolution?Cyberwar: (R)evolution?
Cyberwar: (R)evolution?
zapp0
 
CYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIORCYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIOR
Dharmik Navadiya
 
_Cyberspace_ Security and Future Challenges in the Digital World.pdf
_Cyberspace_ Security and Future Challenges in the Digital World.pdf_Cyberspace_ Security and Future Challenges in the Digital World.pdf
_Cyberspace_ Security and Future Challenges in the Digital World.pdf
mbmh111980
 

Similar to Cyber power affects war outcomes in modern era (20)

In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
 
RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWAR
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national security
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
 
Cyber weapons 1632578286
Cyber weapons 1632578286Cyber weapons 1632578286
Cyber weapons 1632578286
 
Cyberwarfare and Aggressiveness in Cyberspace
Cyberwarfare and Aggressiveness in CyberspaceCyberwarfare and Aggressiveness in Cyberspace
Cyberwarfare and Aggressiveness in Cyberspace
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
USSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert LinUSSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert Lin
 
Cyber Operations in Smart Megacities: TechNet Augusta 2015
Cyber Operations in Smart Megacities: TechNet Augusta 2015Cyber Operations in Smart Megacities: TechNet Augusta 2015
Cyber Operations in Smart Megacities: TechNet Augusta 2015
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas
 
Crim cybersecurity_jarno_limnéll
Crim cybersecurity_jarno_limnéllCrim cybersecurity_jarno_limnéll
Crim cybersecurity_jarno_limnéll
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 
Cyberwar: (R)evolution?
Cyberwar: (R)evolution?Cyberwar: (R)evolution?
Cyberwar: (R)evolution?
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
CYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIORCYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIOR
 
_Cyberspace_ Security and Future Challenges in the Digital World.pdf
_Cyberspace_ Security and Future Challenges in the Digital World.pdf_Cyberspace_ Security and Future Challenges in the Digital World.pdf
_Cyberspace_ Security and Future Challenges in the Digital World.pdf
 

More from Bhadra Thakuri

Geological fieldwork report
Geological fieldwork reportGeological fieldwork report
Geological fieldwork report
Bhadra Thakuri
 
Human security
Human securityHuman security
Human security
Bhadra Thakuri
 
Anthropology of disaster
Anthropology of disasterAnthropology of disaster
Anthropology of disaster
Bhadra Thakuri
 
Plate tectonics
Plate tectonicsPlate tectonics
Plate tectonics
Bhadra Thakuri
 
Gender based voilence in developing country
Gender based voilence in developing countryGender based voilence in developing country
Gender based voilence in developing country
Bhadra Thakuri
 
Mahatma gandhi a non-violent leader
Mahatma gandhi  a non-violent leaderMahatma gandhi  a non-violent leader
Mahatma gandhi a non-violent leader
Bhadra Thakuri
 
Mao tse tung a transformational leader and his guerilla war
Mao tse tung a transformational leader and his guerilla warMao tse tung a transformational leader and his guerilla war
Mao tse tung a transformational leader and his guerilla war
Bhadra Thakuri
 
Philosophical dimensions of research with case
Philosophical dimensions of research with casePhilosophical dimensions of research with case
Philosophical dimensions of research with case
Bhadra Thakuri
 

More from Bhadra Thakuri (8)

Geological fieldwork report
Geological fieldwork reportGeological fieldwork report
Geological fieldwork report
 
Human security
Human securityHuman security
Human security
 
Anthropology of disaster
Anthropology of disasterAnthropology of disaster
Anthropology of disaster
 
Plate tectonics
Plate tectonicsPlate tectonics
Plate tectonics
 
Gender based voilence in developing country
Gender based voilence in developing countryGender based voilence in developing country
Gender based voilence in developing country
 
Mahatma gandhi a non-violent leader
Mahatma gandhi  a non-violent leaderMahatma gandhi  a non-violent leader
Mahatma gandhi a non-violent leader
 
Mao tse tung a transformational leader and his guerilla war
Mao tse tung a transformational leader and his guerilla warMao tse tung a transformational leader and his guerilla war
Mao tse tung a transformational leader and his guerilla war
 
Philosophical dimensions of research with case
Philosophical dimensions of research with casePhilosophical dimensions of research with case
Philosophical dimensions of research with case
 

Recently uploaded

Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
Faculty of Medicine And Health Sciences
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Orkestra
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
Access Innovations, Inc.
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
Vladimir Samoylov
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
Howard Spence
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Sebastiano Panichella
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
Sebastiano Panichella
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
faizulhassanfaiz1670
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Access Innovations, Inc.
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
OWASP Beja
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
IP ServerOne
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Matjaž Lipuš
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
khadija278284
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
eCommerce Institute
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Sebastiano Panichella
 

Recently uploaded (16)

Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
 

Cyber power affects war outcomes in modern era

  • 1. CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA BHADRA BAHADUR SINGH THAKURI
  • 2. AIM To highlight on the findings of cyber power and its effects in modern era warfare
  • 3. SEQUENCE OF PRESENTATION INTRODUCTION REVIEW OF LITERATURE/ RESEARCH METHODOLOGY DYNAMICS OF MODERN ERA WARFARE CYBER SPACE AN EMERGING DOMAIN OF WARFARE CYBER THREATS TO NATIONAL SECURITY CYBER SECURITY STATUS IN NEPAL CYBER POWER & WAR OUTCOMES IN MODERN ERA FINDINGS, CONCLUSION AND RECOMMENDATIONS CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
  • 4. “The Cyber Battlefield is real. It’s a place where computers are used instead of guns, data packets instead of bullets, and firewalls are used instead of barbed wire” - RICHARD TRACY CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
  • 5. INTRODUCTION CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA War fighting domain, means and method are changing and being more complex with the time and technological advancement Cyber space is emerging as new domain of warfare which is vast, virtual and complex Superior cyber capability can dominate adversaries in modern warfare Use of cyber without adequate security measures threatens internal and global security Nepal as a developing country the use of computer is proliferated in Multi sectors Cyber power shapes war outcomes in modern era Many Nations are building cyber capability and are in quest of cyber power
  • 6. STATEMENT OF THE PROBLEM  What is the role of cyber power in modern warfare?  What are the threats to national security via cyber space?  How does cyber affect war outcomes in modern era? CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
  • 7. To describe the role of cyber power in modern warfare To document the threats to national security via cyber space To examine the effects of cyber power in modern era warfare CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA OBJECTIVES OF THE STUDY
  • 8. METHOD/ LIMITATIONS Research Method  Qualitative Approach Explorative & Descriptive Method Case Study Office Visit & Interview Subject Limitations Focus on effects of cyber power in warfare Secondary data  Key actor’s future actions are out of reach  What next in technology is difficult to predict  Cyber security status in Nepal as example of developing country CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
  • 9. REVIEW OF THE LITERATURE  Modern Warfare : Understanding Modern Warfare  Information Warfare : Global Information Warfare: How Businesses, Governments, and Others Achieve Objectives and Attain Competitive Advantages  Cyber Space : Cyberspaces and Global Affairs Cyber space and National Security: Threats, Opportunities and Power in a Virtual World The New Digital Age: Reshaping the Future of People, Nations and Business  Cyber Warfare : Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners  Cyber Security : Cyber security: What Everyone Needs to Know Mitigating the Local and Global Challenges of Cyber Security CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
  • 10. • Aerial warfare • Asymmetric warfare • Biological warfare • Chemical warfare • Electronic warfare • Land warfare • Guerrilla warfare • Use of Propaganda • Psychological actions • Information Warfare • Naval warfare • Network-centric warfare • Nuclear war • Space warfare DYNAMICS OF MODERN WARFARE CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
  • 11. CYBERSPACE AN EMERGING DOMAIN OF WARFARE CYBER WARFARE SEA AERO SPACE LAND CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA OUTER SPACE
  • 12. Penetration to enemy system to obtain information Disruption of C and C system General disruption through viruses Selective disruption Disruption at some particular time frame FORMS OF CYBER WARFARE Espionage and national security breaches  Sabotage  Hacker warfare  Computer Viruses  Worms  Trojan Horses  Logic Bombs  Trap Doors  Chipping
  • 13. Distinct Features of Cyber warfare Non-physical domain and no demarcated boundaries Enable actors without employing armed forces Disproportionate power to relatively insignificant actorsOperating behind false IP address Boundaries are blurred between the military and civilian Power can be exerted by state or non state actors CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
  • 14. As Extension of politics Impact on Military Mission/ Campaign Cyber at strategic and operational level CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA CYBERSPACE AN EMERGING DOMAIN OF WARFARE…
  • 15. Cyber Vulnerabilities Cyber Intrusion Cyber Exploitation Cyber Espionage Cyber theft Cyber Attack Cyber Security Building Cyber Resilient force Building Cyber Offensive capabilities Joint Cyber Security Cell CYBER THREATS TO NATIONAL SECURITY Essential Fundamentals for Protection from Cyber threat Increased protection against cyber attack The capability to detect when an attack is taking place The potential to react or recover when an attack is detected CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
  • 16. New global economy has increased the spread of computer systems Third world countries are in a position to use computer systems which can possibly threaten global securityMilitary units should be trained specifically to exploit enemy vulnerabilities Use the new team to gather intelligence, disseminate warnings and indications Provide authorities With intelligence on the new threats to national security Educate civilian and military personnel from top to bottom on IW threats DEVELOPING COUNTRIES AND CYBER Computer technology is being rapidly proliferated CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
  • 17. • Application of GIS • E-Governance Initiatives • Cyber Security Emergency Response Team • Legal Provisions •Electronic Transaction Act 2008 •IT Policy 2000 • Cyber Crime Investigation Process IT INITIATIVES & CYBER SECURITY PROVISION IN NEPAL CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA CYBER SECURITY STATUS IN NEPAL
  • 18. 1955 1960 1970 1975 1985 Invasion Computer Cruise Missile GIS APPLICATIONS OF NA IN TRACKING SYSTEM 1945 TodayMobile Comm Nepal Army Patrol GPS Satellites GPS Reading GPS Reading Send Via GPRS GPS Reading Send Via GPRS Nepal Army HQ Application of GIS CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
  • 19. E- Governance Initiatives Legal Provisions •Electronic Transaction Act 2008 •IT Policy 2000 Cyber Security Emergency Response Team Cyber Crime Investigation Process in Nepal Formulated in 2006 Digital National Identity Card CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA EXISTING CYBER SECURITY PROVISION IN NEPAL • Information and Evidence Collection • Case Analysis • Arrest Offender • Documentation • Prosecution ITSERT-NP • First Information Record • Co-ordinate with Informer or Victim • Information Analysis and Verification • Police Deployment
  • 20. Computer as a Tool Computer as a Target CYBER CRIMES IN NEPAL• Financial Crimes • Cyber Pornography • Sale of Illegal Articles • Online Gambling • Intellectual Property Crimes • Email Spoofing • Forgery • Cyber Defamation • Cyber Stalking • Unauthorized Access to Computer Systems or Networks • Theft of Information Contained in Electronic Form • Email Bombing • Data Diddling • Salami Attacks • Virus / Worm Attacks • Denial of Service Attack • Logic Bombs • Internet Time Thefts • Trojan Attacks • Web Jacking • Theft of Computer System • Physically damaging a computer system CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
  • 21. IO N Precautionary Measures Cyber Crime Investigation Body Cyber Security in Nepal Monitoring Mechanism Cyber Security Policy NEED OF CYBER SECURITY IN NEPAL CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA Provision of CERT
  • 22. METHODS OF PROTECTING CYBER SYSTEM Use of Firewalls Anti Virus Do not open unknown email Turn off/ disconnect computer when not in use Disable hidden filename extension Do not run programs of unknown origin Disable scripting features in email programs Make regular backup of critical data Keep all applications patched
  • 23. The Evolution of USCYBERCOM The People’s Republic of China The Islamic Republic of Iran Russia North Korea CYBER POWER AND WAR OUTCOMES IN MODERN ERA Quest of Cyber Power by Key Players CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
  • 24. CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA CHARACTERISTICS OF CYBER POWER Complementary instruments of power when used autonomously Cheaper and very low entry cost Easy to deliver with stealth from anywhere Difficult to trace the origin of an attack Ability to disrupt the adversary than destroying the forces No need to engage in combat operations/ Less or no bloodshed  Favors the attacker
  • 25. CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA EFFECTS OF CYBER POWER ON MODERN WARFARE Relations between states and non-state actors Stealth makes it attractive to many users  Indispensable element of modern technology- based military capability Key lever in the development and execution of national policy Achieve political and strategic goal without armed conflict Gives disproportionate power to small and insignificant actors Boundaries are blurred between military and civilian/physical & virtual power Speedy attack
  • 26. •Cyber technology has emerged as invariable feature of modern life •Cyber space- vast, complex and rapidly changing battle space having no physical boundary •Cyber power is the COG of globalized world •Cyber weapons are versatile •Small attack offers force multiplier •Complementary status may change to decisive and catastrophic at any time • Existing cyber security provision in Nepal is not sufficient hence awareness of users is necessary • Difficult to determine the defensive posture CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA FINDINGS
  • 27. RECOMMENDATIONS Opportunity CERT Training Knowledge Awareness Formulation of cyber warfare strategy/ Cyber security body Establishment of Digital Forensic Enforcement of cyber law/ Institutions to produce human resources in IT Air gap/Maintaining backup of critical data CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA
  • 28. CONCLUSION Need of secured cyber space in Nepal Paradigm shift in Warfare Changing realm of National security CYBER POWER AFFECTS WAR OUTCOMES IN MODERN ERA