SlideShare a Scribd company logo
1 of 9
Cyber War
Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant
Cyber War
Papadakis Konstantinos
Cyber Warfare Analyst & Cyber Defense/Security Consultant
Cyber War
Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant
Introduction
The emergence (1990s) of risk scenarios related to individual incidents of
information systems being breached by independent individuals or groups (Hackers),
was linked to the penetration of digital technologies into government, military,
corporate and personal infrastructures and activities.
Over time the risk of the possible consequences was upgraded turning simple
scenarios into horror scenarios as simple network penetration attacks evolved into
normal war (cyber war) mutating the field of Cyberspace into a field of "battle" for
organized groups (anonymous, etc.), criminal/terrorist organizations or states.
What are the possible consequences in the event that hackers (with or without
government support) attack through Cyberspace and:
Cut off electricity, gas and water supply to entire regions and cities?
Paralyze the banking system (Web Banking, ATM operation, etc) in a
country?
Shut down airports, ports, hospitals, oil refineries and factories?
Gain access to control systems for conventional or even weapons of
mass destruction (nuclear, chemical substances)?
The above scenarios are taking shape in our day, moving beyond simple
vandalism, criminal profiteering and even espionage to include the kind of physical
disruption and destruction that was once only possible through military attacks and
terrorist sabotage, while creating a new reality of a war which is being waged
continuously (24-7-365) in the field of cyberspace escaping the stage of science
fiction and the exercises of war games.
For a country, the potential effects of operations in Cyberspace (Cyberattacks)
are serious, with a huge range starting from disrupting the daily life of its citizens to
undermining its sovereignty.
History of Cyberwarfare
Historically, the term "cyber war" was mentioned for the first time in Thomas
Rid's book, "The Rise of the Machines"1
while it was presented for the first time
(1987) in an article at Omni magazine describing future wars with giant robots,
autonomous flying vehicles weapons and systems.
The original idea of a robotic cyber war similar to the famous Schwarzenegger
film “Terminator”, due to its impracticality, was quickly abandoned and replaced by
the idea2
of using hackers in the context of military operations not only for
reconnaissance and spying on enemy systems, but also for attacking and disrupting
the digital systems the adversary uses for command and control.
1
https://ridt.co/machines/
2
CyberWar is Coming (John Arquilla and David Ronfeldt)
https://www.rand.org/pubs/reprints/RP223.html
Cyber War
Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant
The above perspective quickly adapted to the reality that wants hackers not to
limit their attacks only to military computers3
, but to be able to attack the digital and
automated systems of the adversary's critical infrastructure, with potentially
devastating consequences for civilians.
Probably this form and definition of cyber-war has in mind President Bill
Clinton in 2001 when in his speech4
he warned about the criticality of cyber-attacks
on digital systems.
Clarke and Knake5
use the term "cyberwarfare" to describe those "...actions by
a nation-state to penetrate the computers or networks of another nation with the
intent to cause harm or disruption...". This definition roughly includes the same things
that we have identified as "acts of war", with the difference that in this case they are
carried out by digital means, having the ability to cross the borders of the virtual
world ( cyberspace) and have real consequences in the physical world.
Threats
In an anarchic system like Cyberspace, the perpetrators who engage in illegal
activities are mainly grouped based on the purpose for which they operate, as below
(increasing threat level):
• Individual Hackers-Crackers.
• Activists-Hackers.
• Domestic perpetrators without intent.
• Hackers-Crackers groups.
• Perpetrators of industrial espionage.
• Organized crime.
• Physical and environmental attacks.
• Terrorist organizations.
• Internal actors and External collaborators/consultants with intent.
• Countries.
Purpose of Cyber Operations
Cyberspace operations are conducted to achieve some specific purpose:
3
An Exploration of Cyberspace Security R&D Investment Strategies for DARPA (Robert H. Anderson, Anthony
C. Hearn)
https://www.rand.org/pubs/monograph_reports/MR797.html
4
“…today, our critical systems, from power generation, control and distribution structures to air traffic control, are linked and
operated by computers…”, and that someone “…can sit at a computer, infiltrate another computer by paralyzing a company, a
city or a government...'.
https://www.govinfo.gov/content/pkg/PPP-2000-book1/html/PPP-2000-book1-doc-pg13-2.htm
5
Richard Clarke: National Security Advisor to Presidents Bush, Clinton and Bush. Book "Cyber War-The next threat to National
Security and what to do about it"
Robert Knake: Cyber Security Advisor to President Obama.
Cyber War
Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant
Exploitation: The main objective is to intercept information from the target or
information sources connected to it.
Deception: The perpetrator allows the target to continue to operate, but falsifies the
information it collects, analyzes, or produces, effectively targeting the adversary's
decision-making system.
Destruction: The attacker disables the target by destroying it or the support systems
necessary for its operation. In this case, the primary target is not the adversary's
information systems, but its critical infrastructure.
Disruption or neutralization: The attacker does not destroy the target but disables
it or renders it unreliable for a period of time, denying legitimate users from its
service or access to information sources.
Methods of Accessing the Target System
A prerequisite for the occurrence of a Cyber-attack is the restoration of
electronic contact of the perpetrator with the system – a goal which requires:
• Interconnection (directly or indirectly) of the system with the
cyberspace-internet.
• Physical access to the system in the case of no connection to the
cyberspace-internet.
• Indirect access to the target system through the build or crash recovery
chain or the system spares chain.
Means of Cyberattacks (Cyberweapons)
There are several means also known as Cyber weapons that an entity
(country, organization, etc.) could use to carry out Cyber Attacks:
• Computer: Basic tool-means (weapon) of cyber-attacks, which in
principle is used as a means of production of cyber-weapons (software) as well as a
vehicle-platform of the attack.
• Software: Malicious programs (viruses, Trojan horses, digital worms,
spyware, etc.) intended to compromise the confidentiality, integrity or availability of
an information system.
Cyber War
Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant
• Physical weapons: Actions/weapons that are used in the physical
space with the aim of disrupting the operations/services of the target information
infrastructure, these can be:
 Weapons of manifestation of conventional physical attack.
 Physical electronic/digital attack manifestation weapons.
• Psychological Weapons: Psychological operations as well as Influence
operations are an integral part of Information operations and Cyberspace operations
assist them whenever required mainly by helping to conduct them in the Cyberspace
field. However, there are cases in which Cyberspace operations use the procedures of
psychological companies mainly for purposes of collecting information of their
interest (phishing).
Cyber Operations Tactics
The basic tactics that can be used during operations in Cyberspace are the following:
Destruction of the target system: By digitally or physically destroying
the target system, the attacker manages to stop the services provided by the specific
system.
Falsification/Transformation of Data: Aims at the malicious conversion,
i.e. falsification of the data/information that is entered, found in, or exported to an
information system, with the result that legitimate users (people or machines) make
important decisions based on maliciously altered information.
Denial-of-Service (DoS): Its purpose is the partial or total deprivation -
both in terms of quality and duration - of legal users from the services offered to
them by an information system.
Espionage: The adversary, by making use of information capabilities,
covertly and without legalization gains access to large amounts of digital and
communication data. With the appearance of social networks and the development
of communication via the internet, it has also extended to the spying/monitoring of
the users themselves.
Propaganda (Propaganda): The internet, as a basic means of
information, can very easily become a means of propaganda, with the use of
appropriate information techniques, since the protection afforded to the user by
anonymity facilitates this activity.
Cyber War
Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant
Incidents
The modern perspective of cyberspace operations combined with the
increasing dependence of states on their information infrastructure requires the
adoption of action models that integrate such operations into the entire military
power strategy of states.
Examples of first steps in this direction are:
First Chechen War (1994)
Chechen separatists used the internet as a propaganda tool.
Second Chechen War (1999-2000)
Russian officials have been accused of hacking into Chechen websites, escalating the
conflict in cyberspace.
Kosovo War (1999)
The internet infrastructures of NATO, USA and Britain were subjected to cyber attacks.
Estonia (2007) - Web War I (WWI)
Coordinated Cyber-attacks on the entire country’s digital infrastructure resulting in
the dissolution of its information infrastructure for a long period of time without
being accompanied by corresponding pressure from conventional military
operations.
Georgia (2008)
The first real hybrid war in which conventional military forces (Russian armed forces)
and information and cyber operations forces were combined, resulting in complex
intelligence operations.
Stuxnet Affair (2010)
Tailored cyberattack via malware targeting Iran's nuclear program.
What isn’t Cyberwar
It is not espionage, as interception of information (Cyber Espionage) is only one part
of it.
It is not cybercrime as it is not oriented towards financial gain, regardless of whether
states often use, due to organization and knowledge, criminal groups for their
operations.
Cyber War
Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant
It is not considered Information Warfare, although lately there is a tendency to fully
integrate cyber operations into Information operations.
Cyber peace
The rise of the destructive potential of cyberwar, raises the question of how to avoid
an endless, widespread digital conflict.
As a first step we could assume that increased cyber security or cyber defense would
be a solution, however the attack always has the advantage especially when it is
supported by state structures and targets critical infrastructure of the adversary.
Additional solutions would be:
Deterrence which can be manifested either by diplomatic, economic or even military
means.
Treaties and Agreements that can establish rules and frameworks for cooperation,
limiting cyber attacks and the proliferation of cyber weapons.
Epilogue
The field of Cyberspace, due to its particularities but also due to the increasing
dependence of state infrastructures on it, is already and will continue to be a field of
wide confrontation between states to other traditional battlefields (Land, Sea, Air,
Space).
Cyberwar and Cyberspace operations as a choice to capture the power of a state and
therefore according to the saying of Carl von Clausewitz as a means of continuing the
policy with the aim of imposing the will of one state on another can under certain
conditions be a strategic choice, a solution necessity or a power multiplier.
Clausewitz, with his insight and analytical thinking, saw that "every age has its own
kind of war, its own limitations and its own particular prejudices." Our age, the age of
computing and information, is no exception, it has its own war, the Cyber War which
is part of the wider information war.
Cyber War
Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant
Bibliography
Martin C. Libicki
“CyberDeterrence and CyberWar”
Jason Andress-Steve Winterfeld
“Cyber Warfare”
Will Gragido-John Pirc
“CyberCrime and Espionage”
Jeffrey Carr: “Inside Cyber Warfare
Mapping the Cyberworld”
Stuart McClure-Joel Scambray-George Kurtz
“Hacking Exposed 6”
Σπηλιωτόπουλος Δ.
“Ψυχο-Κοινωνιολογία της κυριαρχίας: Κυβερνοπόλεμος”
ΣΕΕΘΑ (Υπγος ε.α. Μαυρόπουλος Π.)
“Η Κυβερνοάμυνα στην υπηρεσία της εθνικής στρατηγικής”
Estonia NATO CCDCOE
“Cyber Attacks Against Georgia: Legal Lessons Identified”
Ανδρέας Ν. Λιαρόπουλος
“H γεωγραφία και η πληροφόρηση ως διαστάσεις της παγκόσμιας ασφάλειας. O
κυβερνοχώρος ως το νέο γεωπολιτικό παράδειγμα στην εποχή της πληροφόρησης”
Παναγιώτης Κίκιρας
“Εισαγωγή στον πληροφοριακό πόλεμο-Information Warfare”
Παπαδουλή Μάρθα
“Οι επιθέσεις στον Κυβερνοχώρο: Τι είναι και ποιους προβληματισμούς δημιουργούν”
Δημήτρης Γκρίτζαλης
“Προστασία Κρίσιμων Πληροφοριακών και Επικοινωνιακών Υποδομών της Δημόσιας
Διοίκησης: Στρατηγικός Σχεδιασμός”
US Air Force Doctrine Document 3-12 (15 Ιουλίου 2010)
CyberSpace Operations
US Army
Cyberspace Operation Concept Capability Plan 2016-2028. (22 Feb 2010)
US Joint Pub 3-13
“Joint Doctrine for Information Operations”
US Strategic Command
“Joint Concept of Operations for Global Information Grid NetOps”
US Joint Chiefs of Staff
“The National Military Strategy for Cyberspace Operations”
Cyber War
Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant

More Related Content

Similar to Cyber War

Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxnikshaikh786
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docxalinainglis
 
Lesson2a-General types of CyberCrime.pptx
Lesson2a-General types of CyberCrime.pptxLesson2a-General types of CyberCrime.pptx
Lesson2a-General types of CyberCrime.pptxadnis1
 
Iaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd Iaetsd
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav SinghGaurav Singh
 
IJSRED-V2I3P69
IJSRED-V2I3P69IJSRED-V2I3P69
IJSRED-V2I3P69IJSRED
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesblogzilla
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity riskblogzilla
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityMuhammad Hamza
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisIRJET Journal
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security Sanguine_Eva
 

Similar to Cyber War (20)

28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
C018131821
C018131821C018131821
C018131821
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
 
Brooks18
Brooks18Brooks18
Brooks18
 
Lesson2a-General types of CyberCrime.pptx
Lesson2a-General types of CyberCrime.pptxLesson2a-General types of CyberCrime.pptx
Lesson2a-General types of CyberCrime.pptx
 
Iaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd cyber crimeand
Iaetsd cyber crimeand
 
CYBER AWARENESS
CYBER AWARENESSCYBER AWARENESS
CYBER AWARENESS
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
 
IJSRED-V2I3P69
IJSRED-V2I3P69IJSRED-V2I3P69
IJSRED-V2I3P69
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Computer crime (1)
Computer crime (1)Computer crime (1)
Computer crime (1)
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 

More from Papadakis K.-Cyber-Information Warfare Analyst & Cyber Defense/Security Consultant-Hellenic MoD

More from Papadakis K.-Cyber-Information Warfare Analyst & Cyber Defense/Security Consultant-Hellenic MoD (20)

Russia Ukraine war Cyberspace operations (2022-2024)
Russia Ukraine war Cyberspace operations (2022-2024)Russia Ukraine war Cyberspace operations (2022-2024)
Russia Ukraine war Cyberspace operations (2022-2024)
 
Russia Ukraine Conflict_Cyberspace Operations_2021_2023.pdf
Russia Ukraine Conflict_Cyberspace Operations_2021_2023.pdfRussia Ukraine Conflict_Cyberspace Operations_2021_2023.pdf
Russia Ukraine Conflict_Cyberspace Operations_2021_2023.pdf
 
Mitigation of cyber threats 1a.pdf
Mitigation of cyber threats 1a.pdfMitigation of cyber threats 1a.pdf
Mitigation of cyber threats 1a.pdf
 
CYBER KILL CHAIN Table
CYBER KILL CHAIN TableCYBER KILL CHAIN Table
CYBER KILL CHAIN Table
 
Logismika Parakolouthisis.docx
Logismika Parakolouthisis.docxLogismika Parakolouthisis.docx
Logismika Parakolouthisis.docx
 
Surveillance Software.docx
Surveillance Software.docxSurveillance Software.docx
Surveillance Software.docx
 
Ρωσία εναντίον Εσθονίας:ο πρώτος κυβερνοπόλεμος (2007)
Ρωσία εναντίον Εσθονίας:ο πρώτος κυβερνοπόλεμος (2007)Ρωσία εναντίον Εσθονίας:ο πρώτος κυβερνοπόλεμος (2007)
Ρωσία εναντίον Εσθονίας:ο πρώτος κυβερνοπόλεμος (2007)
 
Russia vs Estonia_First Cyber War (2007)
Russia vs Estonia_First Cyber War (2007)Russia vs Estonia_First Cyber War (2007)
Russia vs Estonia_First Cyber War (2007)
 
ΚΥΒΕΡΝΟΠΟΛΕΜΟΣ
ΚΥΒΕΡΝΟΠΟΛΕΜΟΣΚΥΒΕΡΝΟΠΟΛΕΜΟΣ
ΚΥΒΕΡΝΟΠΟΛΕΜΟΣ
 
Κυβερνοχώρος: Νέο πεδίο αντιπαραθέσεων
Κυβερνοχώρος: Νέο πεδίο αντιπαραθέσεωνΚυβερνοχώρος: Νέο πεδίο αντιπαραθέσεων
Κυβερνοχώρος: Νέο πεδίο αντιπαραθέσεων
 
Cyberspace_New Operational Domain
Cyberspace_New Operational DomainCyberspace_New Operational Domain
Cyberspace_New Operational Domain
 
Πληροφοριακός Πόλεμος-Information Warfare
Πληροφοριακός Πόλεμος-Information WarfareΠληροφοριακός Πόλεμος-Information Warfare
Πληροφοριακός Πόλεμος-Information Warfare
 
Information Warfare
Information WarfareInformation Warfare
Information Warfare
 
Corporate Cyber Security
Corporate Cyber SecurityCorporate Cyber Security
Corporate Cyber Security
 
Russia Georgia 2008 Conflict-Information Operations, Cyberwarfare
Russia Georgia 2008 Conflict-Information Operations, CyberwarfareRussia Georgia 2008 Conflict-Information Operations, Cyberwarfare
Russia Georgia 2008 Conflict-Information Operations, Cyberwarfare
 
Cyber risks for enterprises-Vacations Time
Cyber risks for enterprises-Vacations TimeCyber risks for enterprises-Vacations Time
Cyber risks for enterprises-Vacations Time
 
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
 
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και ΝαυτιλίαMaritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
 
Κυβερνοπόλεμος-Επιχειρήσεις Κυβερνοχώρου-Cyber War-Cyber Warfare
Κυβερνοπόλεμος-Επιχειρήσεις Κυβερνοχώρου-Cyber War-Cyber WarfareΚυβερνοπόλεμος-Επιχειρήσεις Κυβερνοχώρου-Cyber War-Cyber Warfare
Κυβερνοπόλεμος-Επιχειρήσεις Κυβερνοχώρου-Cyber War-Cyber Warfare
 
Οδηγός Προστασίας από την Ηλεκτρονική Εξαπάτηση-Phihing Guide
Οδηγός Προστασίας από την Ηλεκτρονική Εξαπάτηση-Phihing GuideΟδηγός Προστασίας από την Ηλεκτρονική Εξαπάτηση-Phihing Guide
Οδηγός Προστασίας από την Ηλεκτρονική Εξαπάτηση-Phihing Guide
 

Recently uploaded

Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneCall girls in Ahmedabad High profile
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 

Recently uploaded (20)

Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 

Cyber War

  • 1. Cyber War Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant Cyber War Papadakis Konstantinos Cyber Warfare Analyst & Cyber Defense/Security Consultant
  • 2. Cyber War Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant Introduction The emergence (1990s) of risk scenarios related to individual incidents of information systems being breached by independent individuals or groups (Hackers), was linked to the penetration of digital technologies into government, military, corporate and personal infrastructures and activities. Over time the risk of the possible consequences was upgraded turning simple scenarios into horror scenarios as simple network penetration attacks evolved into normal war (cyber war) mutating the field of Cyberspace into a field of "battle" for organized groups (anonymous, etc.), criminal/terrorist organizations or states. What are the possible consequences in the event that hackers (with or without government support) attack through Cyberspace and: Cut off electricity, gas and water supply to entire regions and cities? Paralyze the banking system (Web Banking, ATM operation, etc) in a country? Shut down airports, ports, hospitals, oil refineries and factories? Gain access to control systems for conventional or even weapons of mass destruction (nuclear, chemical substances)? The above scenarios are taking shape in our day, moving beyond simple vandalism, criminal profiteering and even espionage to include the kind of physical disruption and destruction that was once only possible through military attacks and terrorist sabotage, while creating a new reality of a war which is being waged continuously (24-7-365) in the field of cyberspace escaping the stage of science fiction and the exercises of war games. For a country, the potential effects of operations in Cyberspace (Cyberattacks) are serious, with a huge range starting from disrupting the daily life of its citizens to undermining its sovereignty. History of Cyberwarfare Historically, the term "cyber war" was mentioned for the first time in Thomas Rid's book, "The Rise of the Machines"1 while it was presented for the first time (1987) in an article at Omni magazine describing future wars with giant robots, autonomous flying vehicles weapons and systems. The original idea of a robotic cyber war similar to the famous Schwarzenegger film “Terminator”, due to its impracticality, was quickly abandoned and replaced by the idea2 of using hackers in the context of military operations not only for reconnaissance and spying on enemy systems, but also for attacking and disrupting the digital systems the adversary uses for command and control. 1 https://ridt.co/machines/ 2 CyberWar is Coming (John Arquilla and David Ronfeldt) https://www.rand.org/pubs/reprints/RP223.html
  • 3. Cyber War Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant The above perspective quickly adapted to the reality that wants hackers not to limit their attacks only to military computers3 , but to be able to attack the digital and automated systems of the adversary's critical infrastructure, with potentially devastating consequences for civilians. Probably this form and definition of cyber-war has in mind President Bill Clinton in 2001 when in his speech4 he warned about the criticality of cyber-attacks on digital systems. Clarke and Knake5 use the term "cyberwarfare" to describe those "...actions by a nation-state to penetrate the computers or networks of another nation with the intent to cause harm or disruption...". This definition roughly includes the same things that we have identified as "acts of war", with the difference that in this case they are carried out by digital means, having the ability to cross the borders of the virtual world ( cyberspace) and have real consequences in the physical world. Threats In an anarchic system like Cyberspace, the perpetrators who engage in illegal activities are mainly grouped based on the purpose for which they operate, as below (increasing threat level): • Individual Hackers-Crackers. • Activists-Hackers. • Domestic perpetrators without intent. • Hackers-Crackers groups. • Perpetrators of industrial espionage. • Organized crime. • Physical and environmental attacks. • Terrorist organizations. • Internal actors and External collaborators/consultants with intent. • Countries. Purpose of Cyber Operations Cyberspace operations are conducted to achieve some specific purpose: 3 An Exploration of Cyberspace Security R&D Investment Strategies for DARPA (Robert H. Anderson, Anthony C. Hearn) https://www.rand.org/pubs/monograph_reports/MR797.html 4 “…today, our critical systems, from power generation, control and distribution structures to air traffic control, are linked and operated by computers…”, and that someone “…can sit at a computer, infiltrate another computer by paralyzing a company, a city or a government...'. https://www.govinfo.gov/content/pkg/PPP-2000-book1/html/PPP-2000-book1-doc-pg13-2.htm 5 Richard Clarke: National Security Advisor to Presidents Bush, Clinton and Bush. Book "Cyber War-The next threat to National Security and what to do about it" Robert Knake: Cyber Security Advisor to President Obama.
  • 4. Cyber War Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant Exploitation: The main objective is to intercept information from the target or information sources connected to it. Deception: The perpetrator allows the target to continue to operate, but falsifies the information it collects, analyzes, or produces, effectively targeting the adversary's decision-making system. Destruction: The attacker disables the target by destroying it or the support systems necessary for its operation. In this case, the primary target is not the adversary's information systems, but its critical infrastructure. Disruption or neutralization: The attacker does not destroy the target but disables it or renders it unreliable for a period of time, denying legitimate users from its service or access to information sources. Methods of Accessing the Target System A prerequisite for the occurrence of a Cyber-attack is the restoration of electronic contact of the perpetrator with the system – a goal which requires: • Interconnection (directly or indirectly) of the system with the cyberspace-internet. • Physical access to the system in the case of no connection to the cyberspace-internet. • Indirect access to the target system through the build or crash recovery chain or the system spares chain. Means of Cyberattacks (Cyberweapons) There are several means also known as Cyber weapons that an entity (country, organization, etc.) could use to carry out Cyber Attacks: • Computer: Basic tool-means (weapon) of cyber-attacks, which in principle is used as a means of production of cyber-weapons (software) as well as a vehicle-platform of the attack. • Software: Malicious programs (viruses, Trojan horses, digital worms, spyware, etc.) intended to compromise the confidentiality, integrity or availability of an information system.
  • 5. Cyber War Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant • Physical weapons: Actions/weapons that are used in the physical space with the aim of disrupting the operations/services of the target information infrastructure, these can be:  Weapons of manifestation of conventional physical attack.  Physical electronic/digital attack manifestation weapons. • Psychological Weapons: Psychological operations as well as Influence operations are an integral part of Information operations and Cyberspace operations assist them whenever required mainly by helping to conduct them in the Cyberspace field. However, there are cases in which Cyberspace operations use the procedures of psychological companies mainly for purposes of collecting information of their interest (phishing). Cyber Operations Tactics The basic tactics that can be used during operations in Cyberspace are the following: Destruction of the target system: By digitally or physically destroying the target system, the attacker manages to stop the services provided by the specific system. Falsification/Transformation of Data: Aims at the malicious conversion, i.e. falsification of the data/information that is entered, found in, or exported to an information system, with the result that legitimate users (people or machines) make important decisions based on maliciously altered information. Denial-of-Service (DoS): Its purpose is the partial or total deprivation - both in terms of quality and duration - of legal users from the services offered to them by an information system. Espionage: The adversary, by making use of information capabilities, covertly and without legalization gains access to large amounts of digital and communication data. With the appearance of social networks and the development of communication via the internet, it has also extended to the spying/monitoring of the users themselves. Propaganda (Propaganda): The internet, as a basic means of information, can very easily become a means of propaganda, with the use of appropriate information techniques, since the protection afforded to the user by anonymity facilitates this activity.
  • 6. Cyber War Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant Incidents The modern perspective of cyberspace operations combined with the increasing dependence of states on their information infrastructure requires the adoption of action models that integrate such operations into the entire military power strategy of states. Examples of first steps in this direction are: First Chechen War (1994) Chechen separatists used the internet as a propaganda tool. Second Chechen War (1999-2000) Russian officials have been accused of hacking into Chechen websites, escalating the conflict in cyberspace. Kosovo War (1999) The internet infrastructures of NATO, USA and Britain were subjected to cyber attacks. Estonia (2007) - Web War I (WWI) Coordinated Cyber-attacks on the entire country’s digital infrastructure resulting in the dissolution of its information infrastructure for a long period of time without being accompanied by corresponding pressure from conventional military operations. Georgia (2008) The first real hybrid war in which conventional military forces (Russian armed forces) and information and cyber operations forces were combined, resulting in complex intelligence operations. Stuxnet Affair (2010) Tailored cyberattack via malware targeting Iran's nuclear program. What isn’t Cyberwar It is not espionage, as interception of information (Cyber Espionage) is only one part of it. It is not cybercrime as it is not oriented towards financial gain, regardless of whether states often use, due to organization and knowledge, criminal groups for their operations.
  • 7. Cyber War Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant It is not considered Information Warfare, although lately there is a tendency to fully integrate cyber operations into Information operations. Cyber peace The rise of the destructive potential of cyberwar, raises the question of how to avoid an endless, widespread digital conflict. As a first step we could assume that increased cyber security or cyber defense would be a solution, however the attack always has the advantage especially when it is supported by state structures and targets critical infrastructure of the adversary. Additional solutions would be: Deterrence which can be manifested either by diplomatic, economic or even military means. Treaties and Agreements that can establish rules and frameworks for cooperation, limiting cyber attacks and the proliferation of cyber weapons. Epilogue The field of Cyberspace, due to its particularities but also due to the increasing dependence of state infrastructures on it, is already and will continue to be a field of wide confrontation between states to other traditional battlefields (Land, Sea, Air, Space). Cyberwar and Cyberspace operations as a choice to capture the power of a state and therefore according to the saying of Carl von Clausewitz as a means of continuing the policy with the aim of imposing the will of one state on another can under certain conditions be a strategic choice, a solution necessity or a power multiplier. Clausewitz, with his insight and analytical thinking, saw that "every age has its own kind of war, its own limitations and its own particular prejudices." Our age, the age of computing and information, is no exception, it has its own war, the Cyber War which is part of the wider information war.
  • 8. Cyber War Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant Bibliography Martin C. Libicki “CyberDeterrence and CyberWar” Jason Andress-Steve Winterfeld “Cyber Warfare” Will Gragido-John Pirc “CyberCrime and Espionage” Jeffrey Carr: “Inside Cyber Warfare Mapping the Cyberworld” Stuart McClure-Joel Scambray-George Kurtz “Hacking Exposed 6” Σπηλιωτόπουλος Δ. “Ψυχο-Κοινωνιολογία της κυριαρχίας: Κυβερνοπόλεμος” ΣΕΕΘΑ (Υπγος ε.α. Μαυρόπουλος Π.) “Η Κυβερνοάμυνα στην υπηρεσία της εθνικής στρατηγικής” Estonia NATO CCDCOE “Cyber Attacks Against Georgia: Legal Lessons Identified” Ανδρέας Ν. Λιαρόπουλος “H γεωγραφία και η πληροφόρηση ως διαστάσεις της παγκόσμιας ασφάλειας. O κυβερνοχώρος ως το νέο γεωπολιτικό παράδειγμα στην εποχή της πληροφόρησης” Παναγιώτης Κίκιρας “Εισαγωγή στον πληροφοριακό πόλεμο-Information Warfare” Παπαδουλή Μάρθα “Οι επιθέσεις στον Κυβερνοχώρο: Τι είναι και ποιους προβληματισμούς δημιουργούν” Δημήτρης Γκρίτζαλης “Προστασία Κρίσιμων Πληροφοριακών και Επικοινωνιακών Υποδομών της Δημόσιας Διοίκησης: Στρατηγικός Σχεδιασμός” US Air Force Doctrine Document 3-12 (15 Ιουλίου 2010) CyberSpace Operations US Army Cyberspace Operation Concept Capability Plan 2016-2028. (22 Feb 2010) US Joint Pub 3-13 “Joint Doctrine for Information Operations” US Strategic Command “Joint Concept of Operations for Global Information Grid NetOps” US Joint Chiefs of Staff “The National Military Strategy for Cyberspace Operations”
  • 9. Cyber War Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant