Cyber warfare is becoming an increasingly common method for nations to engage in conflict without direct military confrontation. As technology advances faster than international laws and regulations, cyber attacks present a new threat landscape. Nations are investing heavily in growing their cyber warfare capabilities due to concerns about vulnerabilities and a desire to gain strategic advantages over rivals. However, this cyber arms race risks escalating conflicts and reducing overall digital security.
This is a working document for presentation to Cyber Security Professionals concerning a tactical mindset in securing cyberspace within organizations. High level, can add in case studies, more content to come Dec 2010 for the European, UK and German presentation. Feel free to respond to add to brief. Requires Notes
Cyberterrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.
Cyberterrorism is a controversial term. Some authors choose a very narrow definition, relating to deployments, by known terrorist organizations, of disruption attacks against information systems for the primary purpose of creating alarm and panic. By this narrow definition, it is difficult to identify any instances of cyberterrorism.
Cyberterrorism can be also defined as the intentional use of computer, networks, and public internet to cause destruction and harm for personal objectives.[1] Objectives may be political or ideological since this is a form of terrorism[citation needed].
There is much concern from government and media sources about potential damages that could be caused by cyberterrorism, and this has prompted official responses from government agencies.
This is a working document for presentation to Cyber Security Professionals concerning a tactical mindset in securing cyberspace within organizations. High level, can add in case studies, more content to come Dec 2010 for the European, UK and German presentation. Feel free to respond to add to brief. Requires Notes
Cyberterrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.
Cyberterrorism is a controversial term. Some authors choose a very narrow definition, relating to deployments, by known terrorist organizations, of disruption attacks against information systems for the primary purpose of creating alarm and panic. By this narrow definition, it is difficult to identify any instances of cyberterrorism.
Cyberterrorism can be also defined as the intentional use of computer, networks, and public internet to cause destruction and harm for personal objectives.[1] Objectives may be political or ideological since this is a form of terrorism[citation needed].
There is much concern from government and media sources about potential damages that could be caused by cyberterrorism, and this has prompted official responses from government agencies.
The presentation describes the technology which is been used for national security. These are the most powerful technology to prevent from danger. We could find new technology which has not been seen.
Being aware of the trends that are expected to shape the digital landscape is an important step in ensuring the security of your data and online assets.
Amongst others, the webinar covers:
• Top Cyber Trends for 2023
• Cyber Insurance
• Prioritization of Cyber Risk
Presenters:
Colleen Lennox
Colleen Lennox is the Founder of Cyber Job Central, a newly formed job board dedicated to Cybersecurity job openings. Colleen has 25+ years in Technical Recruiting and loves to help other find their next great job!
Madhu Maganti
Madhu is a goal-oriented cybersecurity/IT advisory leader with more than 20 years of comprehensive experience leading high-performance teams with a proven track record of continuous improvement toward objectives. He is highly knowledgeable in both technical and business principles and processes.
Madhu specializes in cybersecurity risk assessments, enterprise risk management, regulatory compliance, Sarbanes-Oxley (SOX) compliance and system and organization controls (SOC) reporting.
Date: January 25, 2023
Tags: ISO, ISO/IEC 27032, Cybersecurity Management
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27032
https://pecb.com/article/cybersecurity-risk-assessment
https://pecb.com/article/a-deeper-understanding-of-cybersecurity
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/BAAl_PI9uRc
Cyberwar is a form of conflict conducted in the digital realm, where nations, organizations, or individuals use cyberattacks and cyber espionage to achieve strategic goals or gain an advantage over their adversaries. Here's a detailed description of the topic:
1. **Definition**: Cyberwar refers to the use of computer-based techniques and tactics to disrupt, damage, or gain unauthorized access to computer systems, networks, and critical infrastructure, often with the intent to exert influence, espionage, or conduct acts of aggression against an adversary.
2. **Goals and Objectives**:
- **Espionage**: One primary objective of cyberwarfare is to gather intelligence by infiltrating the computer networks of other nations, organizations, or individuals.
- **Disruption**: Cyberwarfare can be used to disrupt critical infrastructure, such as power grids, transportation systems, or financial institutions, causing chaos and economic damage.
- **Destruction**: In some cases, cyberattacks may aim to destroy data, systems, or capabilities, causing long-term damage.
- **Psychological Operations**: Cyberwarfare can be used for psychological operations (PsyOps) to manipulate public opinion or create fear and uncertainty.
3. **Methods**:
- **Malware**: The use of malicious software like viruses, worms, Trojans, and ransomware to compromise systems.
- **Phishing**: Deceptive emails or websites that trick individuals into revealing sensitive information like passwords.
- **Denial of Service (DoS) and Distributed Denial of Service (DDoS)** attacks: Overwhelming a target's network or website to render it inaccessible.
- **Advanced Persistent Threats (APTs)**: Long-term, targeted attacks aimed at stealing information or controlling systems.
- **Zero-Day Exploits**: Exploiting vulnerabilities in software or hardware that are not yet known to the vendor.
4. **Attribution Challenges**: Determining the source of cyberattacks can be difficult due to the use of proxy servers, false flags, or the involvement of non-state actors.
5. **International Laws and Norms**: The legal framework for cyberwar is still evolving. Nations are working to establish rules and norms governing state behavior in cyberspace.
6. **Escalation and Deterrence**: The use of cyberweapons raises concerns about escalation and deterrence. The lack of clear boundaries in cyberspace can lead to unintended consequences.
7. **Notable Examples**:
- Stuxnet: A computer worm allegedly developed by the United States and Israel to sabotage Iran's nuclear program.
- NotPetya: A ransomware attack in 2017 that caused widespread damage, initially believed to be a cyberattack by Russia against Ukraine.
- SolarWinds: A supply chain attack discovered in 2020, attributed to Russian hackers, which compromised numerous U.S. government and private sector.
The presentation describes the technology which is been used for national security. These are the most powerful technology to prevent from danger. We could find new technology which has not been seen.
Being aware of the trends that are expected to shape the digital landscape is an important step in ensuring the security of your data and online assets.
Amongst others, the webinar covers:
• Top Cyber Trends for 2023
• Cyber Insurance
• Prioritization of Cyber Risk
Presenters:
Colleen Lennox
Colleen Lennox is the Founder of Cyber Job Central, a newly formed job board dedicated to Cybersecurity job openings. Colleen has 25+ years in Technical Recruiting and loves to help other find their next great job!
Madhu Maganti
Madhu is a goal-oriented cybersecurity/IT advisory leader with more than 20 years of comprehensive experience leading high-performance teams with a proven track record of continuous improvement toward objectives. He is highly knowledgeable in both technical and business principles and processes.
Madhu specializes in cybersecurity risk assessments, enterprise risk management, regulatory compliance, Sarbanes-Oxley (SOX) compliance and system and organization controls (SOC) reporting.
Date: January 25, 2023
Tags: ISO, ISO/IEC 27032, Cybersecurity Management
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27032
https://pecb.com/article/cybersecurity-risk-assessment
https://pecb.com/article/a-deeper-understanding-of-cybersecurity
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/BAAl_PI9uRc
Cyberwar is a form of conflict conducted in the digital realm, where nations, organizations, or individuals use cyberattacks and cyber espionage to achieve strategic goals or gain an advantage over their adversaries. Here's a detailed description of the topic:
1. **Definition**: Cyberwar refers to the use of computer-based techniques and tactics to disrupt, damage, or gain unauthorized access to computer systems, networks, and critical infrastructure, often with the intent to exert influence, espionage, or conduct acts of aggression against an adversary.
2. **Goals and Objectives**:
- **Espionage**: One primary objective of cyberwarfare is to gather intelligence by infiltrating the computer networks of other nations, organizations, or individuals.
- **Disruption**: Cyberwarfare can be used to disrupt critical infrastructure, such as power grids, transportation systems, or financial institutions, causing chaos and economic damage.
- **Destruction**: In some cases, cyberattacks may aim to destroy data, systems, or capabilities, causing long-term damage.
- **Psychological Operations**: Cyberwarfare can be used for psychological operations (PsyOps) to manipulate public opinion or create fear and uncertainty.
3. **Methods**:
- **Malware**: The use of malicious software like viruses, worms, Trojans, and ransomware to compromise systems.
- **Phishing**: Deceptive emails or websites that trick individuals into revealing sensitive information like passwords.
- **Denial of Service (DoS) and Distributed Denial of Service (DDoS)** attacks: Overwhelming a target's network or website to render it inaccessible.
- **Advanced Persistent Threats (APTs)**: Long-term, targeted attacks aimed at stealing information or controlling systems.
- **Zero-Day Exploits**: Exploiting vulnerabilities in software or hardware that are not yet known to the vendor.
4. **Attribution Challenges**: Determining the source of cyberattacks can be difficult due to the use of proxy servers, false flags, or the involvement of non-state actors.
5. **International Laws and Norms**: The legal framework for cyberwar is still evolving. Nations are working to establish rules and norms governing state behavior in cyberspace.
6. **Escalation and Deterrence**: The use of cyberweapons raises concerns about escalation and deterrence. The lack of clear boundaries in cyberspace can lead to unintended consequences.
7. **Notable Examples**:
- Stuxnet: A computer worm allegedly developed by the United States and Israel to sabotage Iran's nuclear program.
- NotPetya: A ransomware attack in 2017 that caused widespread damage, initially believed to be a cyberattack by Russia against Ukraine.
- SolarWinds: A supply chain attack discovered in 2020, attributed to Russian hackers, which compromised numerous U.S. government and private sector.
Event: George Washington University -- National Security Threat Convergence: ...Chuck Brooks
● US Critical Infrastructure Sectors as Targets, presented by Charles Brooks, Vice President, Government Relations & Marketing, Sutherland Government Solutions and Chairman of the CompTIA New and Emerging Technologies Committee
CYBERWAR IS NOT A CONVENTIONAL WAR. NATIONS ARE YET TO ENTER INTO ANY INTERNATIONAL TREATY IN THE FIELD OF CYBERWAR. RULES ARE REQUIRED TO BE FRAMED IN THIS FIELD KEEPING IN VIEW THE POTENTIAL OF DAMAGE WHICH CAN BE CAUSED IN THE EVENT OF CYBERWAR.
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docxsmile790243
LAST ISSUE -CYBER ESPIONAGE
Businesses and government agencies in many countries experienced a spike in targeted attacks originating outside their borders, many from China. Analysis of the attacks leads security experts to believe that many governments are involved in cyber espionage. Cyber espionage is the use of the Internet to spy on other governments. Not only is the Internet being leveraged for international espionage, but it is also being used for economic espionage. Economic espionage refers to the use of the Internet by nation-states to steal corporate information in an effort to gain economic advantages in multinational deals.
One report describes how Chinese hackers infected the Rolls Royce corporate network with a Trojan horse that sent secret corporate information from the network to a remote server. Shell Oil Company discovered a Chinese cyber spy ring in Houston, Texas, working to steal confidential pricing information from servers at its operation in Africa.
Although it would be easy to jump to the conclusion that the Chinese government is behind all of these attacks, experts are quick to point out that it is difficult to pinpoint the origin of an attack. The Internet makes it possible for hackers to launch attacks from any server in the world. If an attack originates in China and is engineered by a Chinese citizen, it still cannot be determined if that person is working for the government. The Chinese government vehemently denies any part in cyber espionage. Still, most governments hold the Chinese government accountable for not cracking down on hackers if not actually sponsoring them. It is estimated that 30 percent of malicious software is created in China. The next largest distributor of malware is Russia and Eastern Europe.
A report developed by security firm McAfee states that “120 countries are developing ways to use the Internet as a weapon to target financial markets, government computer systems, and utilities.” A number of experts are calling this the “cyber cold war.”
The Internet of Things may become the Internet of Threats!
Questions:
1. Find a recent article concerning Hacking or Cyber espionage. Recap the article. Then create your own question and answer from the content.
2. Why are countries and businesses concerned about cyber espionage that originates in China and Russia?
3. What are the dangers if the cyber cold war turns into an actual cyber war?
...
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYTalwant Singh
Cyber is a real threat and we can not keep our eyes shut to the same. Most of the countries surrounding us are involved in cyberwar covertly and we need to take steps to counter the same at the earliest.
Running headEMERGING THREATS AND COUNTERMEASURES .docxrtodd599
Running head: EMERGING THREATS AND COUNTERMEASURES 1
LITERATURE REVIEW
Emerging threats and countermeasures in the U.S. critical infrastructure
Table of content
Background information 3
Research questions 3
Methodological approach 3
Data analysis and findings 3
Challenges in confronting threats 6
Conclusion and discussion 8
References…………………………………………………………………………………………9
Background information
In recent times, the province of security architecture has profoundly transposed by the escalation of threats targeting critical national infrastructure. The rise in such threats is directly related to the rapid integration of the infrastructures with emergent information technologies (IT). That said, it is easy to conclude that the destructive threats to the infrastructures are from cybercrime. Cybercrime manifests in several dimensions from worms, viruses to malware. It would be easy if such threats confronted quickly. However, the state of affairs is that it is not an easy endeavor at all, and hence protecting national infrastructure is even more challenging than it has ever been.Research questions
This essay answers the questions of the literature related to the emergent threats in the protection of critical national infrastructure. More also, it answers the question of the challenges involved in securing the infrastructures.Methodological approach
The study of data collection is conducted using a qualitative approach. Qualitative research is the scientific study of observations that seeks to describe, explore, explain, and diagnose phenomena by gathering non-numerical data.Data analysis and findings
It has not been easy protecting national infrastructure in the last two decades thanks to an increase in cybercrime. Public information systems are lucrative targets for hackers and other ill-motivated criminals. The state affairs have led to a conclusion that in a time in the current generation, the world is increasingly veering toward cyber warfare. The cost of cybersecurity threats is estimated to be over billions of dollars and still learning. Even with new measures, it appears the rate at which cybercriminals are expanding their technological dominion in the deep web is exceedingly strange.
Cybersecurity attacks take different dimensions. Perhaps one of the most devastating has been related to user inefficiency when handling systems. Most cybercriminal activities have shown an impeccable ability to surpass both the human and system shields that protect systems. In the dawn of the early 2000s, for example, the world was in a panic following an attack unleashed by two Philippine students. The attack, known as love bug exposed the value system behind the human-based security system. It is one of the weakness and which is solely flexible to easy manipulation. Following the love bug attack, the national intelligence system had to be switched off for several hours. The cutting-edge world has seen a multiplication in th.
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxglendar3
Running head: METHODS USED IN CYBER WARFARE 1
METHODS USED IN CYBER WARFARE 2
Salina Khadgi
Professor Creider
5th April , 2020
Methods used in cyber warfare and cyber attack
Thesis: There are diverse methods that various people or nations, for a set of diverse reasons, can damage computers or information networks.
I. Introduction
II. Types of cyber attacks Comment by R Daniel Creider: A, B, and C should not be part of the introduction.
A. Espionage
B. Sabotage
C. Propaganda
D. Economic disruption
E. Surprise Cyber Attack
III. Methods used in Cyber Attacks
F. Denial-of-service (DoS)
G. Phishing and spear phishing attacks
H. SQL injection attack
I. Drive-by attacks
J. Man-in-the-middle (MitM) attack
K. Password attacks
L. Malware attack
M. Eavesdropping attack
IV. Motivators for cyber attacks
N. Military
O. Civil
P. Private sector
Q. Non-profit Research
V. Preparedness
VI. Cyber counterintelligence
Methods used in Cyber warfare and cyber attacks
Just like other warfare, Cyber warfare is a digital war where computer viruses are sent instead of army and hacking into database with the aim to create damages and destruction. With the increasing use of computer and technology in almost every field obstruction of data can be a bigger war than an actual war. Acquiring sensitive data about a country, business, person or anything that relies in computational functions are in risk if the data is lost which can cause metamorphosis of a certain company that relies hugely on computer. There are diverse methods that various people or nations, for a set of diverse reasons, can damage computers or information network. Cyber-attack is a broad picture of cyber warfare, similar types of methods are used in cyber warfare and cyber-attack. When a nation’s database or the system of one of its branches is attacked for war reasons or for manipulation, the term cyber warfare is used. Comment by R Daniel Creider: Why is this text in bold?
You need both an abstract and an introduction.
You should have place holders in the draft to indicate that those sections of the paper have not been written.
Cyberwarfare is, therefore, a long period of cyberattacks carried out now and then, and at some point, it includes traditional military actions between countries. The fact, however, is that to date, the actual act hasn't taken place. But many states have had an eye for an eye military-cyber action, and a good example is the cyber-attack launched by the US against the Iranian Weapons as retaliation for US drone Iranian shot down. This paper looks at the primary methods used in cyber warfare and cyber-attacks.
The increasing technology is not causing mass destruction to business organizations, but to critical government agencies to. Cyberattacks and cyberwarfare are at the center of every threat that information technology possesses to the government agencies. Those running the ICT sector as experts still have several debates as per the actual meaning/definition of cyberwarf.
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxtodd581
Running head: METHODS USED IN CYBER WARFARE 1
METHODS USED IN CYBER WARFARE 2
Salina Khadgi
Professor Creider
5th April , 2020
Methods used in cyber warfare and cyber attack
Thesis: There are diverse methods that various people or nations, for a set of diverse reasons, can damage computers or information networks.
I. Introduction
II. Types of cyber attacks Comment by R Daniel Creider: A, B, and C should not be part of the introduction.
A. Espionage
B. Sabotage
C. Propaganda
D. Economic disruption
E. Surprise Cyber Attack
III. Methods used in Cyber Attacks
F. Denial-of-service (DoS)
G. Phishing and spear phishing attacks
H. SQL injection attack
I. Drive-by attacks
J. Man-in-the-middle (MitM) attack
K. Password attacks
L. Malware attack
M. Eavesdropping attack
IV. Motivators for cyber attacks
N. Military
O. Civil
P. Private sector
Q. Non-profit Research
V. Preparedness
VI. Cyber counterintelligence
Methods used in Cyber warfare and cyber attacks
Just like other warfare, Cyber warfare is a digital war where computer viruses are sent instead of army and hacking into database with the aim to create damages and destruction. With the increasing use of computer and technology in almost every field obstruction of data can be a bigger war than an actual war. Acquiring sensitive data about a country, business, person or anything that relies in computational functions are in risk if the data is lost which can cause metamorphosis of a certain company that relies hugely on computer. There are diverse methods that various people or nations, for a set of diverse reasons, can damage computers or information network. Cyber-attack is a broad picture of cyber warfare, similar types of methods are used in cyber warfare and cyber-attack. When a nation’s database or the system of one of its branches is attacked for war reasons or for manipulation, the term cyber warfare is used. Comment by R Daniel Creider: Why is this text in bold?
You need both an abstract and an introduction.
You should have place holders in the draft to indicate that those sections of the paper have not been written.
Cyberwarfare is, therefore, a long period of cyberattacks carried out now and then, and at some point, it includes traditional military actions between countries. The fact, however, is that to date, the actual act hasn't taken place. But many states have had an eye for an eye military-cyber action, and a good example is the cyber-attack launched by the US against the Iranian Weapons as retaliation for US drone Iranian shot down. This paper looks at the primary methods used in cyber warfare and cyber-attacks.
The increasing technology is not causing mass destruction to business organizations, but to critical government agencies to. Cyberattacks and cyberwarfare are at the center of every threat that information technology possesses to the government agencies. Those running the ICT sector as experts still have several debates as per the actual meaning/definition of cyberwarf.
हम आग्रह करते हैं कि जो भी सत्ता में आए, वह संविधान का पालन करे, उसकी रक्षा करे और उसे बनाए रखे।" प्रस्ताव में कुल तीन प्रमुख हस्तक्षेप और उनके तंत्र भी प्रस्तुत किए गए। पहला हस्तक्षेप स्वतंत्र मीडिया को प्रोत्साहित करके, वास्तविकता पर आधारित काउंटर नैरेटिव का निर्माण करके और सत्तारूढ़ सरकार द्वारा नियोजित मनोवैज्ञानिक हेरफेर की रणनीति का मुकाबला करके लोगों द्वारा निर्धारित कथा को बनाए रखना और उस पर कार्यकरना था।
‘वोटर्स विल मस्ट प्रीवेल’ (मतदाताओं को जीतना होगा) अभियान द्वारा जारी हेल्पलाइन नंबर, 4 जून को सुबह 7 बजे से दोपहर 12 बजे तक मतगणना प्रक्रिया में कहीं भी किसी भी तरह के उल्लंघन की रिपोर्ट करने के लिए खुला रहेगा।
role of women and girls in various terror groupssadiakorobi2
Women have three distinct types of involvement: direct involvement in terrorist acts; enabling of others to commit such acts; and facilitating the disengagement of others from violent or extremist groups.
In a May 9, 2024 paper, Juri Opitz from the University of Zurich, along with Shira Wein and Nathan Schneider form Georgetown University, discussed the importance of linguistic expertise in natural language processing (NLP) in an era dominated by large language models (LLMs).
The authors explained that while machine translation (MT) previously relied heavily on linguists, the landscape has shifted. “Linguistics is no longer front and center in the way we build NLP systems,” they said. With the emergence of LLMs, which can generate fluent text without the need for specialized modules to handle grammar or semantic coherence, the need for linguistic expertise in NLP is being questioned.
01062024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
03062024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
31052024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
2. • Over the last decade high profile cyber attacks have steadily increased
among national governments such as United states, China, Russia, Israel
and even north Korea.
• As cyber ware fare becomes the battle field of choice for developed
nations, governments are able to launch direct attacks on each other in
secrecy and without the risk of causing physical harm.
• But computing technology is advancing faster than international
regulations and policies are prepared to deal with such as cyber weapons
offer a new method of nation to wage war without entering into an actual
military confrontation this trend have resulted in new global threats.
3. • The benefits of technological advances are countless the increasing
reliance on computers opens the malicious agents to disrupt or destroy
vital data network and services and as a result national organizations are
going beyond the traditional land air and naval defenses.
• In early 2017 a file of CIA was released by the websitesWikiLeaks
contained over 7000 pages of texts and 900 files of confidential and highly
sensitive information that belongs to United states.
4. • In many cases the computer systems are not the final target -- they are being
targeted because of their role in managing real-world infrastructure like airports or
power grids. Knock out the computers and you can shut down the airport or the
power station as a result.
• There are plenty of grim cyber warfare scenarios available. Perhaps attackers start
with the banks: one day your bank balance drops to zero and then suddenly leaps up,
showing you've got millions in your account.Then stock prices start going crazy as
hackers alter data flowing into the stock exchange.The next day the trains aren't
running because the signaling stops working, and you can't drive anywhere because
the traffic lights are all stuck on red, and the shops in big cities start running out of
food. Pretty soon a country could be reduced to gridlock and chaos, even without the
doomsday scenarios of hackers disabling power stations or opening dams.
6. Beginning of cyber warfare
Stuxnet is a computer worm that targets industrial control systems, but is most
famous for most likely being the first genuine cyber weapon, in that it was
designed to inflict physical damage.
It was developed by the US and Israel (although they have never confirmed this) to
target the Iranian nuclear programme.The worm, first spotted in 2010, targeted
specific Siemens industrial control systems, and seemed to be targeting the
systems controlling the centrifuges in the Iranian uranium enrichment project --
apparently damaging 1,000 of these centrifuges and delaying the project, although
the overall impact on the programme is not clear.
Stuxnet was a complicated worm, using four different zero-day exploits and likely
took millions of dollars of research and months or years of work to create.
7. • operation Olympic games or stuxnet.
• Iranian struck back at united states by taking down online banking services
for dozens of the largest US financial institutes, costing them tones of
millions of dollars in addition to infiltrating the control system of a small
dam in newYork.
8. Ukraine case
• Ukraine power grid cyber attack took place on 23 December 2015 and is
considered to be the first known successful cyber attack on a power grid.
Hackers were able to successfully compromise information systems of
three energy distribution companies in Ukraine and temporarily disrupt
electricity supply to the end consumers.
• 30 substations were switched off, and about 230 thousand people were
left without electricity for a period from 1 to 6 hours.
• According to representatives of one of the companies, attacks were
conducted from computers with IP addresses allocated to the Russian
Federation.
9. Edward Snowden
XKeyscore is a tool the NSA uses to search "nearly everything a user does on the Internet"
The NSA has at its disposal an elite hacker team codenamed "Tailored AccessOperations" (TAO) that hacks into
computers worldwide, infects them with malware and does the dirty job when other surveillance tactics fail.
The NSA intercepts and stores all phone calls made in the Bahamas and Afghanistan through a program called
MYSTIC, which has its own snazzy logo.
reports described PRISM as the NSA's program to directly access the servers of U.S tech giants like Google, Facebook,
Microsoft and Apple, among others.
The British spy agency, the Government Communications Headquarters (GCHQ), taps fiber optic cables all over the
world to intercept data flowing through the global Internet, we learned.The GCHQ works closely with the NSA,
sharing data and intelligence in a program that's codenamedTempora.
The German newsweekly Der Spiegel revealed that the NSA targets at least 122 world leaders.
Other stories over the past years have named specific targets like German Chancellor Angela Merkel, Brazil's President
Dilma Roussef, and Mexico's former President FelipeCalderon, the French Foreign Ministry, as well as leaders at the
2010 G8 and G20 summits inToronto.
10. Why are governments investing in cyber warfare right now?
• Unlike traditional military attacks, a cyber attack can be launched instantaneously from any
distance, with little obvious evidence of any build-up, unlike a traditional military operation.
Such as attack would be extremely hard to trace back with any certainty to its perpetrators,
making retaliation harder.
• As a result governments and intelligence agencies worry that digital attacks against vital
infrastructure -- like banking systems or power grids -- will give attackers a way of bypassing a
country's traditional defences, and are racing to improve their computer security.
• However, they also see the opportunity that cyberwarfare capabilities bring, offering a new
way to exert influence on rival states without having to put soldiers at risk.The fear of being
vulnerable to the cyberweapons of their rivals plus a desire to harness these tools to bolster
their own standing in the world is leading many countries into a cyber arms race.
11. Social Media
as a weapon
• https://www.youtube.com/watch?v=mrnXv-g4yKU
• Cambridge Analytica Scandal
• https://www.youtube.com/watch?v=q1Hl9bRzwEs
• Russia hacking US accounts
12. What is theTallinn Manual?
• One reason that the legal status of cyberwarfare has been blurred is that there is no
international law that refers to cyberwar, because it is such a new concept. But this doesn't
mean that cyberwarfare isn't covered by law, it's just that the relevant law is piecemeal,
scattered, and often open to interpretation.
• This lack of legal framework has resulted in a grey area that some states are very willing to
exploit, using the opportunity to test out cyberwar techniques in the knowledge that other
states are uncertain about how they could react under international law.
• More recently that grey area has begun to shrink. A group of law scholars has spent years
working to explain how international law can be applied to digital warfare.This work has
formed the basis of theTallinn Manual, a textbook prepared by the group and backed by the
NATO-affiliated Cooperative Cyber Defence Centre of Excellence (CCDCoE) based in the
Estonian capital ofTallinn, from which the manual takes its name.
13. • The first version of the manual looked at the rare but most serious
cyberattacks, the ones at the level of the use of force; the second edition
released tried to build a legal framework around cyberattacks that do not
reach the threshold of the use of force.
• Aimed at legal advisers to governments, military, and intelligence
agencies, theTallinn Manual sets out when an attack is a violation of
international law in cyberspace, and when and how states can respond to
such assaults.
• The manual consists of a set of guidelines -- 154 rules -- which set out
how the lawyers think international law can be applied to cyberwarfare,
covering everything from the use of cyber mercenaries to the targeting of
medical units' computer systems.
14. Is cyberwarfare escalation a concern?
• There is a definite risk that we are at the early stages of a cyberwar arms
race: as countries realise that having a cyberwarfare strategy is necessary
they will increase spending and start to stockpile weapons, just like any
other arms race.That means there could be more nations stockpiling
zero-day attacks, which means more holes in software not being patched,
which makes us all less secure. And countries with stockpiles of cyber
weapons may mean cyber conflicts are able to escalate quicker. One of
the big problems is that these programmes tend to be developed in secret
with very little oversight and accountability and with mirky rules of
engagement.