SlideShare a Scribd company logo
CYBER
WARFARE
Hafsa Farooqi
Maira Asif
Shizza Masood
Ayesha Rasheed
• Over the last decade high profile cyber attacks have steadily increased
among national governments such as United states, China, Russia, Israel
and even north Korea.
• As cyber ware fare becomes the battle field of choice for developed
nations, governments are able to launch direct attacks on each other in
secrecy and without the risk of causing physical harm.
• But computing technology is advancing faster than international
regulations and policies are prepared to deal with such as cyber weapons
offer a new method of nation to wage war without entering into an actual
military confrontation this trend have resulted in new global threats.
• The benefits of technological advances are countless the increasing
reliance on computers opens the malicious agents to disrupt or destroy
vital data network and services and as a result national organizations are
going beyond the traditional land air and naval defenses.
• In early 2017 a file of CIA was released by the websitesWikiLeaks
contained over 7000 pages of texts and 900 files of confidential and highly
sensitive information that belongs to United states.
• In many cases the computer systems are not the final target -- they are being
targeted because of their role in managing real-world infrastructure like airports or
power grids. Knock out the computers and you can shut down the airport or the
power station as a result.
• There are plenty of grim cyber warfare scenarios available. Perhaps attackers start
with the banks: one day your bank balance drops to zero and then suddenly leaps up,
showing you've got millions in your account.Then stock prices start going crazy as
hackers alter data flowing into the stock exchange.The next day the trains aren't
running because the signaling stops working, and you can't drive anywhere because
the traffic lights are all stuck on red, and the shops in big cities start running out of
food. Pretty soon a country could be reduced to gridlock and chaos, even without the
doomsday scenarios of hackers disabling power stations or opening dams.
Types of Cyber security Attacks
• CommonTypes of Cyber securityAttacks.
• Phishing Attacks.
• SQL Injection Attacks (SQLi)
• Cross-Site Scripting (XSS)
• Man-in-the-Middle (MITM) Attacks.
• Malware Attacks.
• Denial-of-Service Attacks.
• Spear Phishing Attacks.
Beginning of cyber warfare
Stuxnet is a computer worm that targets industrial control systems, but is most
famous for most likely being the first genuine cyber weapon, in that it was
designed to inflict physical damage.
It was developed by the US and Israel (although they have never confirmed this) to
target the Iranian nuclear programme.The worm, first spotted in 2010, targeted
specific Siemens industrial control systems, and seemed to be targeting the
systems controlling the centrifuges in the Iranian uranium enrichment project --
apparently damaging 1,000 of these centrifuges and delaying the project, although
the overall impact on the programme is not clear.
Stuxnet was a complicated worm, using four different zero-day exploits and likely
took millions of dollars of research and months or years of work to create.
• operation Olympic games or stuxnet.
• Iranian struck back at united states by taking down online banking services
for dozens of the largest US financial institutes, costing them tones of
millions of dollars in addition to infiltrating the control system of a small
dam in newYork.
Ukraine case
• Ukraine power grid cyber attack took place on 23 December 2015 and is
considered to be the first known successful cyber attack on a power grid.
Hackers were able to successfully compromise information systems of
three energy distribution companies in Ukraine and temporarily disrupt
electricity supply to the end consumers.
• 30 substations were switched off, and about 230 thousand people were
left without electricity for a period from 1 to 6 hours.
• According to representatives of one of the companies, attacks were
conducted from computers with IP addresses allocated to the Russian
Federation.
Edward Snowden
XKeyscore is a tool the NSA uses to search "nearly everything a user does on the Internet"
The NSA has at its disposal an elite hacker team codenamed "Tailored AccessOperations" (TAO) that hacks into
computers worldwide, infects them with malware and does the dirty job when other surveillance tactics fail.
The NSA intercepts and stores all phone calls made in the Bahamas and Afghanistan through a program called
MYSTIC, which has its own snazzy logo.
reports described PRISM as the NSA's program to directly access the servers of U.S tech giants like Google, Facebook,
Microsoft and Apple, among others.
The British spy agency, the Government Communications Headquarters (GCHQ), taps fiber optic cables all over the
world to intercept data flowing through the global Internet, we learned.The GCHQ works closely with the NSA,
sharing data and intelligence in a program that's codenamedTempora.
The German newsweekly Der Spiegel revealed that the NSA targets at least 122 world leaders.
Other stories over the past years have named specific targets like German Chancellor Angela Merkel, Brazil's President
Dilma Roussef, and Mexico's former President FelipeCalderon, the French Foreign Ministry, as well as leaders at the
2010 G8 and G20 summits inToronto.
Why are governments investing in cyber warfare right now?
• Unlike traditional military attacks, a cyber attack can be launched instantaneously from any
distance, with little obvious evidence of any build-up, unlike a traditional military operation.
Such as attack would be extremely hard to trace back with any certainty to its perpetrators,
making retaliation harder.
• As a result governments and intelligence agencies worry that digital attacks against vital
infrastructure -- like banking systems or power grids -- will give attackers a way of bypassing a
country's traditional defences, and are racing to improve their computer security.
• However, they also see the opportunity that cyberwarfare capabilities bring, offering a new
way to exert influence on rival states without having to put soldiers at risk.The fear of being
vulnerable to the cyberweapons of their rivals plus a desire to harness these tools to bolster
their own standing in the world is leading many countries into a cyber arms race.
Social Media
as a weapon
• https://www.youtube.com/watch?v=mrnXv-g4yKU
• Cambridge Analytica Scandal
• https://www.youtube.com/watch?v=q1Hl9bRzwEs
• Russia hacking US accounts
What is theTallinn Manual?
• One reason that the legal status of cyberwarfare has been blurred is that there is no
international law that refers to cyberwar, because it is such a new concept. But this doesn't
mean that cyberwarfare isn't covered by law, it's just that the relevant law is piecemeal,
scattered, and often open to interpretation.
• This lack of legal framework has resulted in a grey area that some states are very willing to
exploit, using the opportunity to test out cyberwar techniques in the knowledge that other
states are uncertain about how they could react under international law.
• More recently that grey area has begun to shrink. A group of law scholars has spent years
working to explain how international law can be applied to digital warfare.This work has
formed the basis of theTallinn Manual, a textbook prepared by the group and backed by the
NATO-affiliated Cooperative Cyber Defence Centre of Excellence (CCDCoE) based in the
Estonian capital ofTallinn, from which the manual takes its name.
• The first version of the manual looked at the rare but most serious
cyberattacks, the ones at the level of the use of force; the second edition
released tried to build a legal framework around cyberattacks that do not
reach the threshold of the use of force.
• Aimed at legal advisers to governments, military, and intelligence
agencies, theTallinn Manual sets out when an attack is a violation of
international law in cyberspace, and when and how states can respond to
such assaults.
• The manual consists of a set of guidelines -- 154 rules -- which set out
how the lawyers think international law can be applied to cyberwarfare,
covering everything from the use of cyber mercenaries to the targeting of
medical units' computer systems.
Is cyberwarfare escalation a concern?
• There is a definite risk that we are at the early stages of a cyberwar arms
race: as countries realise that having a cyberwarfare strategy is necessary
they will increase spending and start to stockpile weapons, just like any
other arms race.That means there could be more nations stockpiling
zero-day attacks, which means more holes in software not being patched,
which makes us all less secure. And countries with stockpiles of cyber
weapons may mean cyber conflicts are able to escalate quicker. One of
the big problems is that these programmes tend to be developed in secret
with very little oversight and accountability and with mirky rules of
engagement.

More Related Content

What's hot

Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Raheela Patel
 
Information warfare, assurance and security in the energy sectors
Information warfare, assurance  and security in the energy sectorsInformation warfare, assurance  and security in the energy sectors
Information warfare, assurance and security in the energy sectors
Love Steven
 
Cyber security from military point of view
Cyber security from military point of viewCyber security from military point of view
Cyber security from military point of view
S.E. CTS CERT-GOV-MD
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
ANGIEPAEZ304
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Edwin A. Opare
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national securityTalwant Singh
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar Session
Kalilur Rahman
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
Aditya Ratnaparkhi
 
Cyber warfare
Cyber warfareCyber warfare
Cyber warfare
VedangiBrahmbhatt
 
Technology for national security
Technology for national securityTechnology for national security
Technology for national security
MUTHU LAKSHMI
 
malware analysis
malware  analysismalware  analysis
malware analysis
20CS201AkashR
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
PECB
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)Tughral Yamin
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
Accenture
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
sommerville-videos
 
Cyber security for an organization
Cyber security for an organizationCyber security for an organization
Cyber security for an organization
Tejas Wasule
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Mohammad Shakirul islam
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Savigya Singh
 

What's hot (20)

Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Information warfare, assurance and security in the energy sectors
Information warfare, assurance  and security in the energy sectorsInformation warfare, assurance  and security in the energy sectors
Information warfare, assurance and security in the energy sectors
 
Cyber security from military point of view
Cyber security from military point of viewCyber security from military point of view
Cyber security from military point of view
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national security
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar Session
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
 
Cyber warfare
Cyber warfareCyber warfare
Cyber warfare
 
Technology for national security
Technology for national securityTechnology for national security
Technology for national security
 
malware analysis
malware  analysismalware  analysis
malware analysis
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Cyber security for an organization
Cyber security for an organizationCyber security for an organization
Cyber security for an organization
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 

Similar to Cyber warfare ss

Cyber Wars.pptx
Cyber Wars.pptxCyber Wars.pptx
Cyber Wars.pptx
ArjunKumar684595
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifel
Ahmed Tememe
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
Write My Paper One Day Mercy College
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
Chuck Brooks
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
shaympariyar
 
RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWAR
Talwant Singh
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
Buy A Paper Gallatin
 
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docxLAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
smile790243
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
Talwant Singh
 
Cyber war
Cyber warCyber war
Cyber war
Praveen
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docx
rtodd599
 
Cyberwarfare and Aggressiveness in Cyberspace
Cyberwarfare and Aggressiveness in CyberspaceCyberwarfare and Aggressiveness in Cyberspace
Cyberwarfare and Aggressiveness in Cyberspace
Jarno Limnéll
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
glendar3
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
todd581
 
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Esam Abulkhirat
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonEljay Robertson
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
loverakk187
 

Similar to Cyber warfare ss (20)

Cyber Wars.pptx
Cyber Wars.pptxCyber Wars.pptx
Cyber Wars.pptx
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifel
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
114-116
114-116114-116
114-116
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWAR
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docxLAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
 
Cyber war
Cyber warCyber war
Cyber war
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docx
 
Cyberwarfare and Aggressiveness in Cyberspace
Cyberwarfare and Aggressiveness in CyberspaceCyberwarfare and Aggressiveness in Cyberspace
Cyberwarfare and Aggressiveness in Cyberspace
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
 
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 

More from Maira Asif

Secularism and islamism
Secularism and islamismSecularism and islamism
Secularism and islamism
Maira Asif
 
Comparative analysis of chahbahar port and gwadar port
Comparative analysis of chahbahar port and gwadar portComparative analysis of chahbahar port and gwadar port
Comparative analysis of chahbahar port and gwadar port
Maira Asif
 
Foreign Policy of Pakistan vis a vis India
Foreign Policy of Pakistan vis a vis IndiaForeign Policy of Pakistan vis a vis India
Foreign Policy of Pakistan vis a vis India
Maira Asif
 
Plastic Pollution and Pakistan
Plastic Pollution and PakistanPlastic Pollution and Pakistan
Plastic Pollution and Pakistan
Maira Asif
 
Cold War Phase 1 before detente
Cold War Phase 1 before detenteCold War Phase 1 before detente
Cold War Phase 1 before detente
Maira Asif
 
North Korean Dictatorship
North Korean DictatorshipNorth Korean Dictatorship
North Korean Dictatorship
Maira Asif
 
Detailed Subject Verb Agreement Rules
Detailed Subject Verb Agreement RulesDetailed Subject Verb Agreement Rules
Detailed Subject Verb Agreement Rules
Maira Asif
 
Am i a modern man or a robot?
Am i a modern man or a robot?Am i a modern man or a robot?
Am i a modern man or a robot?
Maira Asif
 
Active listening- what is it
Active listening- what is itActive listening- what is it
Active listening- what is it
Maira Asif
 
The oldman and the sea summary by Earnest Hemingway
The oldman and the sea summary by Earnest HemingwayThe oldman and the sea summary by Earnest Hemingway
The oldman and the sea summary by Earnest Hemingway
Maira Asif
 
De beers Diamonds Monopoly
De beers Diamonds MonopolyDe beers Diamonds Monopoly
De beers Diamonds Monopoly
Maira Asif
 
Cola wars Pepsi and Coke Oligopoly
Cola wars Pepsi and Coke OligopolyCola wars Pepsi and Coke Oligopoly
Cola wars Pepsi and Coke Oligopoly
Maira Asif
 
The lord of the flies
The lord of the flies The lord of the flies
The lord of the flies
Maira Asif
 
Germany Geostrategic Significance and Challenges
Germany Geostrategic Significance and ChallengesGermany Geostrategic Significance and Challenges
Germany Geostrategic Significance and Challenges
Maira Asif
 

More from Maira Asif (14)

Secularism and islamism
Secularism and islamismSecularism and islamism
Secularism and islamism
 
Comparative analysis of chahbahar port and gwadar port
Comparative analysis of chahbahar port and gwadar portComparative analysis of chahbahar port and gwadar port
Comparative analysis of chahbahar port and gwadar port
 
Foreign Policy of Pakistan vis a vis India
Foreign Policy of Pakistan vis a vis IndiaForeign Policy of Pakistan vis a vis India
Foreign Policy of Pakistan vis a vis India
 
Plastic Pollution and Pakistan
Plastic Pollution and PakistanPlastic Pollution and Pakistan
Plastic Pollution and Pakistan
 
Cold War Phase 1 before detente
Cold War Phase 1 before detenteCold War Phase 1 before detente
Cold War Phase 1 before detente
 
North Korean Dictatorship
North Korean DictatorshipNorth Korean Dictatorship
North Korean Dictatorship
 
Detailed Subject Verb Agreement Rules
Detailed Subject Verb Agreement RulesDetailed Subject Verb Agreement Rules
Detailed Subject Verb Agreement Rules
 
Am i a modern man or a robot?
Am i a modern man or a robot?Am i a modern man or a robot?
Am i a modern man or a robot?
 
Active listening- what is it
Active listening- what is itActive listening- what is it
Active listening- what is it
 
The oldman and the sea summary by Earnest Hemingway
The oldman and the sea summary by Earnest HemingwayThe oldman and the sea summary by Earnest Hemingway
The oldman and the sea summary by Earnest Hemingway
 
De beers Diamonds Monopoly
De beers Diamonds MonopolyDe beers Diamonds Monopoly
De beers Diamonds Monopoly
 
Cola wars Pepsi and Coke Oligopoly
Cola wars Pepsi and Coke OligopolyCola wars Pepsi and Coke Oligopoly
Cola wars Pepsi and Coke Oligopoly
 
The lord of the flies
The lord of the flies The lord of the flies
The lord of the flies
 
Germany Geostrategic Significance and Challenges
Germany Geostrategic Significance and ChallengesGermany Geostrategic Significance and Challenges
Germany Geostrategic Significance and Challenges
 

Recently uploaded

Draft-1-Resolutions-Key-Interventions-.pdf
Draft-1-Resolutions-Key-Interventions-.pdfDraft-1-Resolutions-Key-Interventions-.pdf
Draft-1-Resolutions-Key-Interventions-.pdf
bhavenpr
 
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdfSharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
bhavenpr
 
Resolutions-Key-Interventions-28-May-2024.pdf
Resolutions-Key-Interventions-28-May-2024.pdfResolutions-Key-Interventions-28-May-2024.pdf
Resolutions-Key-Interventions-28-May-2024.pdf
bhavenpr
 
Codes n Conventionss copy (1).paaaaaaptx
Codes n Conventionss copy (1).paaaaaaptxCodes n Conventionss copy (1).paaaaaaptx
Codes n Conventionss copy (1).paaaaaaptx
ZackSpencer3
 
role of women and girls in various terror groups
role of women and girls in various terror groupsrole of women and girls in various terror groups
role of women and girls in various terror groups
sadiakorobi2
 
Preview of Court Document for Iseyin community
Preview of Court Document for Iseyin communityPreview of Court Document for Iseyin community
Preview of Court Document for Iseyin community
contact193699
 
AI and Covert Influence Operations: Latest Trends
AI and Covert Influence Operations: Latest TrendsAI and Covert Influence Operations: Latest Trends
AI and Covert Influence Operations: Latest Trends
CI kumparan
 
Hogan Comes Home: an MIA WWII crewman is returned
Hogan Comes Home: an MIA WWII crewman is returnedHogan Comes Home: an MIA WWII crewman is returned
Hogan Comes Home: an MIA WWII crewman is returned
rbakerj2
 
2024 is the point of certainty. Forecast of UIF experts
2024 is the point of certainty. Forecast of UIF experts2024 is the point of certainty. Forecast of UIF experts
2024 is the point of certainty. Forecast of UIF experts
olaola5673
 
Do Linguistics Still Matter in the Age of Large Language Models.pptx
Do Linguistics Still Matter in the Age of Large Language Models.pptxDo Linguistics Still Matter in the Age of Large Language Models.pptx
Do Linguistics Still Matter in the Age of Large Language Models.pptx
Slator- Language Industry Intelligence
 
01062024_First India Newspaper Jaipur.pdf
01062024_First India Newspaper Jaipur.pdf01062024_First India Newspaper Jaipur.pdf
01062024_First India Newspaper Jaipur.pdf
FIRST INDIA
 
03062024_First India Newspaper Jaipur.pdf
03062024_First India Newspaper Jaipur.pdf03062024_First India Newspaper Jaipur.pdf
03062024_First India Newspaper Jaipur.pdf
FIRST INDIA
 
31052024_First India Newspaper Jaipur.pdf
31052024_First India Newspaper Jaipur.pdf31052024_First India Newspaper Jaipur.pdf
31052024_First India Newspaper Jaipur.pdf
FIRST INDIA
 

Recently uploaded (13)

Draft-1-Resolutions-Key-Interventions-.pdf
Draft-1-Resolutions-Key-Interventions-.pdfDraft-1-Resolutions-Key-Interventions-.pdf
Draft-1-Resolutions-Key-Interventions-.pdf
 
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdfSharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
 
Resolutions-Key-Interventions-28-May-2024.pdf
Resolutions-Key-Interventions-28-May-2024.pdfResolutions-Key-Interventions-28-May-2024.pdf
Resolutions-Key-Interventions-28-May-2024.pdf
 
Codes n Conventionss copy (1).paaaaaaptx
Codes n Conventionss copy (1).paaaaaaptxCodes n Conventionss copy (1).paaaaaaptx
Codes n Conventionss copy (1).paaaaaaptx
 
role of women and girls in various terror groups
role of women and girls in various terror groupsrole of women and girls in various terror groups
role of women and girls in various terror groups
 
Preview of Court Document for Iseyin community
Preview of Court Document for Iseyin communityPreview of Court Document for Iseyin community
Preview of Court Document for Iseyin community
 
AI and Covert Influence Operations: Latest Trends
AI and Covert Influence Operations: Latest TrendsAI and Covert Influence Operations: Latest Trends
AI and Covert Influence Operations: Latest Trends
 
Hogan Comes Home: an MIA WWII crewman is returned
Hogan Comes Home: an MIA WWII crewman is returnedHogan Comes Home: an MIA WWII crewman is returned
Hogan Comes Home: an MIA WWII crewman is returned
 
2024 is the point of certainty. Forecast of UIF experts
2024 is the point of certainty. Forecast of UIF experts2024 is the point of certainty. Forecast of UIF experts
2024 is the point of certainty. Forecast of UIF experts
 
Do Linguistics Still Matter in the Age of Large Language Models.pptx
Do Linguistics Still Matter in the Age of Large Language Models.pptxDo Linguistics Still Matter in the Age of Large Language Models.pptx
Do Linguistics Still Matter in the Age of Large Language Models.pptx
 
01062024_First India Newspaper Jaipur.pdf
01062024_First India Newspaper Jaipur.pdf01062024_First India Newspaper Jaipur.pdf
01062024_First India Newspaper Jaipur.pdf
 
03062024_First India Newspaper Jaipur.pdf
03062024_First India Newspaper Jaipur.pdf03062024_First India Newspaper Jaipur.pdf
03062024_First India Newspaper Jaipur.pdf
 
31052024_First India Newspaper Jaipur.pdf
31052024_First India Newspaper Jaipur.pdf31052024_First India Newspaper Jaipur.pdf
31052024_First India Newspaper Jaipur.pdf
 

Cyber warfare ss

  • 2. • Over the last decade high profile cyber attacks have steadily increased among national governments such as United states, China, Russia, Israel and even north Korea. • As cyber ware fare becomes the battle field of choice for developed nations, governments are able to launch direct attacks on each other in secrecy and without the risk of causing physical harm. • But computing technology is advancing faster than international regulations and policies are prepared to deal with such as cyber weapons offer a new method of nation to wage war without entering into an actual military confrontation this trend have resulted in new global threats.
  • 3. • The benefits of technological advances are countless the increasing reliance on computers opens the malicious agents to disrupt or destroy vital data network and services and as a result national organizations are going beyond the traditional land air and naval defenses. • In early 2017 a file of CIA was released by the websitesWikiLeaks contained over 7000 pages of texts and 900 files of confidential and highly sensitive information that belongs to United states.
  • 4. • In many cases the computer systems are not the final target -- they are being targeted because of their role in managing real-world infrastructure like airports or power grids. Knock out the computers and you can shut down the airport or the power station as a result. • There are plenty of grim cyber warfare scenarios available. Perhaps attackers start with the banks: one day your bank balance drops to zero and then suddenly leaps up, showing you've got millions in your account.Then stock prices start going crazy as hackers alter data flowing into the stock exchange.The next day the trains aren't running because the signaling stops working, and you can't drive anywhere because the traffic lights are all stuck on red, and the shops in big cities start running out of food. Pretty soon a country could be reduced to gridlock and chaos, even without the doomsday scenarios of hackers disabling power stations or opening dams.
  • 5. Types of Cyber security Attacks • CommonTypes of Cyber securityAttacks. • Phishing Attacks. • SQL Injection Attacks (SQLi) • Cross-Site Scripting (XSS) • Man-in-the-Middle (MITM) Attacks. • Malware Attacks. • Denial-of-Service Attacks. • Spear Phishing Attacks.
  • 6. Beginning of cyber warfare Stuxnet is a computer worm that targets industrial control systems, but is most famous for most likely being the first genuine cyber weapon, in that it was designed to inflict physical damage. It was developed by the US and Israel (although they have never confirmed this) to target the Iranian nuclear programme.The worm, first spotted in 2010, targeted specific Siemens industrial control systems, and seemed to be targeting the systems controlling the centrifuges in the Iranian uranium enrichment project -- apparently damaging 1,000 of these centrifuges and delaying the project, although the overall impact on the programme is not clear. Stuxnet was a complicated worm, using four different zero-day exploits and likely took millions of dollars of research and months or years of work to create.
  • 7. • operation Olympic games or stuxnet. • Iranian struck back at united states by taking down online banking services for dozens of the largest US financial institutes, costing them tones of millions of dollars in addition to infiltrating the control system of a small dam in newYork.
  • 8. Ukraine case • Ukraine power grid cyber attack took place on 23 December 2015 and is considered to be the first known successful cyber attack on a power grid. Hackers were able to successfully compromise information systems of three energy distribution companies in Ukraine and temporarily disrupt electricity supply to the end consumers. • 30 substations were switched off, and about 230 thousand people were left without electricity for a period from 1 to 6 hours. • According to representatives of one of the companies, attacks were conducted from computers with IP addresses allocated to the Russian Federation.
  • 9. Edward Snowden XKeyscore is a tool the NSA uses to search "nearly everything a user does on the Internet" The NSA has at its disposal an elite hacker team codenamed "Tailored AccessOperations" (TAO) that hacks into computers worldwide, infects them with malware and does the dirty job when other surveillance tactics fail. The NSA intercepts and stores all phone calls made in the Bahamas and Afghanistan through a program called MYSTIC, which has its own snazzy logo. reports described PRISM as the NSA's program to directly access the servers of U.S tech giants like Google, Facebook, Microsoft and Apple, among others. The British spy agency, the Government Communications Headquarters (GCHQ), taps fiber optic cables all over the world to intercept data flowing through the global Internet, we learned.The GCHQ works closely with the NSA, sharing data and intelligence in a program that's codenamedTempora. The German newsweekly Der Spiegel revealed that the NSA targets at least 122 world leaders. Other stories over the past years have named specific targets like German Chancellor Angela Merkel, Brazil's President Dilma Roussef, and Mexico's former President FelipeCalderon, the French Foreign Ministry, as well as leaders at the 2010 G8 and G20 summits inToronto.
  • 10. Why are governments investing in cyber warfare right now? • Unlike traditional military attacks, a cyber attack can be launched instantaneously from any distance, with little obvious evidence of any build-up, unlike a traditional military operation. Such as attack would be extremely hard to trace back with any certainty to its perpetrators, making retaliation harder. • As a result governments and intelligence agencies worry that digital attacks against vital infrastructure -- like banking systems or power grids -- will give attackers a way of bypassing a country's traditional defences, and are racing to improve their computer security. • However, they also see the opportunity that cyberwarfare capabilities bring, offering a new way to exert influence on rival states without having to put soldiers at risk.The fear of being vulnerable to the cyberweapons of their rivals plus a desire to harness these tools to bolster their own standing in the world is leading many countries into a cyber arms race.
  • 11. Social Media as a weapon • https://www.youtube.com/watch?v=mrnXv-g4yKU • Cambridge Analytica Scandal • https://www.youtube.com/watch?v=q1Hl9bRzwEs • Russia hacking US accounts
  • 12. What is theTallinn Manual? • One reason that the legal status of cyberwarfare has been blurred is that there is no international law that refers to cyberwar, because it is such a new concept. But this doesn't mean that cyberwarfare isn't covered by law, it's just that the relevant law is piecemeal, scattered, and often open to interpretation. • This lack of legal framework has resulted in a grey area that some states are very willing to exploit, using the opportunity to test out cyberwar techniques in the knowledge that other states are uncertain about how they could react under international law. • More recently that grey area has begun to shrink. A group of law scholars has spent years working to explain how international law can be applied to digital warfare.This work has formed the basis of theTallinn Manual, a textbook prepared by the group and backed by the NATO-affiliated Cooperative Cyber Defence Centre of Excellence (CCDCoE) based in the Estonian capital ofTallinn, from which the manual takes its name.
  • 13. • The first version of the manual looked at the rare but most serious cyberattacks, the ones at the level of the use of force; the second edition released tried to build a legal framework around cyberattacks that do not reach the threshold of the use of force. • Aimed at legal advisers to governments, military, and intelligence agencies, theTallinn Manual sets out when an attack is a violation of international law in cyberspace, and when and how states can respond to such assaults. • The manual consists of a set of guidelines -- 154 rules -- which set out how the lawyers think international law can be applied to cyberwarfare, covering everything from the use of cyber mercenaries to the targeting of medical units' computer systems.
  • 14. Is cyberwarfare escalation a concern? • There is a definite risk that we are at the early stages of a cyberwar arms race: as countries realise that having a cyberwarfare strategy is necessary they will increase spending and start to stockpile weapons, just like any other arms race.That means there could be more nations stockpiling zero-day attacks, which means more holes in software not being patched, which makes us all less secure. And countries with stockpiles of cyber weapons may mean cyber conflicts are able to escalate quicker. One of the big problems is that these programmes tend to be developed in secret with very little oversight and accountability and with mirky rules of engagement.