SlideShare a Scribd company logo
1 of 25
Download to read offline
Cyber Warfare: Terms, Issues, Laws
and Controversies
Ensar Seker
Objectives
• Introduction
• Cyber Terminology
• Major Players in Cyber Space
• Noticeable Cyber Attacks
• Conclusion
NATO: UNCLASSIFIED 2
Introduction
U.S. Intelligence Community ranked cyber
attacks ahead of;
• Terrorism
• Transnational Organized Crime
• Proliferation of Weapons of Mass Destruction
3
Introduction
4
Introduction
5
LAND SEA AIR SPACE
CYBER
Cyber Terminology
Cyber Space
All of the computer networks in the world and
everything they connected and control.
Cyber Warfare
Actions by a nation state to penetrate another
nation‟s computers or networks for the purpose
of causing damage or disruption.
6
Major Players
in Cyber Space
(UNITED STATES)
7
USCYBERCOM NSA FBI US-CERT
NETCOM 24 AIR FORCE MARFORCYBER CYBERFOR ARCYBER INSCOM
Major Players
in Cyber Space
(UNITED STATES)
The Five Pillars
1 - Recognizing that the new domain for warfare is
cyberspace similar to the other elements in the
battlespace.
2 - Proactive defenses as opposed to passive defense.
3 - Critical infrastructure protection (CIP) to ensure the
protection of critical infrastructure.
4 - The use of collective defense, which would provide
the ability of early detection and to incorporate them into
the cyberwarfare defense structure.
5 - Maintaining and enhancing the advantage of
technological change.
8
Major Players
in Cyber Space
(CHINA)
9
Ministry of Public Security People's Liberation Army
Unit 61398
Ministry of State Security
The National Computer Network Emergency Response Technical Team
/Coordination Center of China
Major Players
in Cyber Space
(CHINA)
• China has developed a communications intelligence
program called „Golden Shield‟ using new and advanced
technologies to gather domestic and foreign intelligence.
• PLA has announced the deployment of another crucial
military team: a cyber security squad. Described as an
“Blue Army”.
• There are too many state-level cyber attacks from China to
United States so those attacks are even named. Titan Rain
is a U.S. code name for Chinese military cyber assaults
against the U.S.
10
Major Players
in Cyber Space
(RUSSIA)
11
Special
Communications
and Information
Service
Federal Agency
of Government
Communications
and Information
Main Intelligence
Agency
Federal
Security Service
Major Players
in Cyber Space
(RUSSIA)
• Russian attacks are much more difficult to detect
since they cover their tracks very well unlike their
counterparts in China.
• Russia holds a broad concept of cyber warfare,
which includes intelligence, counterintelligence,
deceit, disinformation, electronic warfare,
debilitation of communications, degradation of
navigation support, psychological pressure,
degradation of information systems and
propaganda.
12
Major Players
in Cyber Space
(NORTH KOREA)
13
The Korean People's Army – Bureau 121
Major Players
in Cyber Space
(NORTH KOREA)
• North Korea has more than 5,000 hacker
forces based on South Korean‟s reports.
• Bureau 121 concentrates exclusively on digital
warfare.
• Primary intelligence targets are South Korea,
Japan, and the United States.
14
Major Players
in Cyber Space
(The Five Eyes Alliance)
15
National Security
Agency
UNITED STATES
Communications
Security
Establishment
CANADA
Government
Communications
Security Bureau
NEW ZEALAND
Government
Communications
Headquarters
UNITED KINGDOM
Defence Signals
Directorate
AUSTRALIA
Major Players
in Cyber Space
(HACKER GROUPS)
16
Equation Group Tailored Access
Operations
Elderwood Group Fancy Bear Dragonfly
Tarh Andishan
/Ajax
Syrian Electronic
Army
Axiom Hidden LYNX Putter Panda
Noticable Cyber Attacks
(2007 Cyberattacks on Estonia)
• Estonian parliament, banks, ministries,
newspapers and broadcasters‟ network
were attacked amid the country's
disagreement with Russia about the
relocation of the Bronze Soldier of
Tallinn.
• No less than 128 exceptional DDOS
assaults focusing on internet
conventions in Estonia
• Internet traffic expanded from 20,000
packets to more than 4 million packets
for every second.
17
Noticable Cyber Attacks
(2008 Cyberattacks on Georgia)
• The Russian-Georgian War begun
in August of 2008.
• Before any gun was fired, cyber
attacks were already hitting
Georgia.
• 54 websites in Georgia related to
communications, finance, and the
government were targeted
immediately.
• All communication channels were
hacked for preventing Georgian
public to be informed
18
Noticable Cyber Attacks
(2010 Cyberattacks on Myanmar)
• DDOS attacks against to
general election in Burma.
• Before any gun was fired,
cyber attacks This election was
the first that Burma had had in
20 years.
• The attacks were significantly
larger than attacks against
Estonia and Georgia in 2007
and 2008 respectively.
19
Noticable Cyber Attacks
(2010 Cyberattacks on Iran)
• Operation Olympic Games was a
covert and still unacknowledged
campaign of sabotage by means of
cyber disruption, directed at Iranian
nuclear facilities by the United States
and likely Israel.
• Stuxnet and Flame malwares were
developed to target industrial
computer systems and was
responsible for causing substantial
damage to Iran's nuclear program.
• Stuxnet specifically targets
programmable logic controllers
(PLCs).
20
Noticable Cyber Attacks
(2014 Cyberattacks on USA)
• Operation Cleaver was a
cyberwarfare covert operation
targeting critical infrastructure
organizations in the US and
worldwide, allegedly planned
and executed by Iran.
• At least 17 US Electricity
companies‟ systems were
attacked, including four utilities,
where hackers stole data and
gained access to private
networks.
21
Noticable Cyber Attacks
(2016 Cyberattacks on USA)
• U.S. intelligence agencies'
conclusion that Russia tried to
influence the election by hacking
people and institutions, including
Democratic Party bodies.
• Based on the reports, Russian
President Vladimir Putin
supervised his intelligence
agencies' hacking of the U.S.
presidential election and turned it
from a general attempt to discredit
American democracy.
22
Noticable Cyber Attacks
(Cyber Weapons)
23
STUXnet
Great Cannon
DuquFlame Mirai
Wiper
Regin
ShammonTurla Rocra
Conclusion
• Cyber Warfare can obtain greater striking
force when compared to traditional army.
• Depending on the internet and network
systems even more in the future, would make
cyber space more vulnerable to cyber attacks.
• As national security concern, cyber threats
dramatically increase.
24
25

More Related Content

What's hot

The New Front Line:An observation of cyber threats in the 21st century
The New Front Line:An observation of cyber threats in the 21st centuryThe New Front Line:An observation of cyber threats in the 21st century
The New Front Line:An observation of cyber threats in the 21st centuryJonathan Francis Roscoe
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreJamie Moore
 
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality CheckCyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality CheckRajeev Chauhan
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011hassanzadeh20
 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Digicomp Academy AG
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat Mishra
 
Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopoliticstnwac
 
Cyber Security, Cyber Warfare
Cyber Security, Cyber WarfareCyber Security, Cyber Warfare
Cyber Security, Cyber WarfareAmit Anand
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usualEnclaveSecurity
 
Kenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warMarioEliseo3
 
A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030Scott Dickson
 
RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARTalwant Singh
 

What's hot (20)

The New Front Line:An observation of cyber threats in the 21st century
The New Front Line:An observation of cyber threats in the 21st centuryThe New Front Line:An observation of cyber threats in the 21st century
The New Front Line:An observation of cyber threats in the 21st century
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality CheckCyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 
Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopolitics
 
Cyber Security, Cyber Warfare
Cyber Security, Cyber WarfareCyber Security, Cyber Warfare
Cyber Security, Cyber Warfare
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Vol7no2 ball
Vol7no2 ballVol7no2 ball
Vol7no2 ball
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usual
 
Kenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-war
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030
 
About cyber war
About cyber warAbout cyber war
About cyber war
 
CYBER TERRORISM
CYBER TERRORISM CYBER TERRORISM
CYBER TERRORISM
 
RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWAR
 

Similar to Cyberware

Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Jim Geovedi
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanShojan Jacob
 
Cybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit MeetingCybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit MeetingDavid Opderbeck
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...David Sweigert
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityAndrea Rossetti
 
Changing Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdfChanging Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdfBenjamin Ang
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesblogzilla
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity riskblogzilla
 
Cyber Security Emerging Threats
Cyber Security Emerging ThreatsCyber Security Emerging Threats
Cyber Security Emerging Threatsisc2dfw
 
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...Cybersecurity Education and Research Centre
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Chuck Brooks
 
CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1Brett L. Scott
 
Cyber threats
Cyber threatsCyber threats
Cyber threatskelsports
 
War between Russia and Ukraine in cyber space
War between Russia and Ukraine in cyber spaceWar between Russia and Ukraine in cyber space
War between Russia and Ukraine in cyber spaceuisgslide
 

Similar to Cyberware (20)

Cyber-what?
Cyber-what?Cyber-what?
Cyber-what?
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?
 
Exp r35
Exp r35Exp r35
Exp r35
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
 
Cyber Wars.pptx
Cyber Wars.pptxCyber Wars.pptx
Cyber Wars.pptx
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace Shojan
 
Cybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit MeetingCybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit Meeting
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
Changing Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdfChanging Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdf
 
OTI Cyber warefare
OTI Cyber warefareOTI Cyber warefare
OTI Cyber warefare
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
Cyber Security Emerging Threats
Cyber Security Emerging ThreatsCyber Security Emerging Threats
Cyber Security Emerging Threats
 
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
 
CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
War between Russia and Ukraine in cyber space
War between Russia and Ukraine in cyber spaceWar between Russia and Ukraine in cyber space
War between Russia and Ukraine in cyber space
 

Recently uploaded

2024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 272024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 27JSchaus & Associates
 
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Roomishabajaj13
 
Climate change and safety and health at work
Climate change and safety and health at workClimate change and safety and health at work
Climate change and safety and health at workChristina Parmionova
 
Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...ResolutionFoundation
 
Fair Trash Reduction - West Hartford, CT
Fair Trash Reduction - West Hartford, CTFair Trash Reduction - West Hartford, CT
Fair Trash Reduction - West Hartford, CTaccounts329278
 
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...Suhani Kapoor
 
Human-AI Collaboration for Virtual Capacity in Emergency Operation Centers (E...
Human-AI Collaborationfor Virtual Capacity in Emergency Operation Centers (E...Human-AI Collaborationfor Virtual Capacity in Emergency Operation Centers (E...
Human-AI Collaboration for Virtual Capacity in Emergency Operation Centers (E...Hemant Purohit
 
VIP Call Girls Pune Vani 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Vani 8617697112 Independent Escort Service PuneVIP Call Girls Pune Vani 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Vani 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
Item # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfItem # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfahcitycouncil
 
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up NumberMs Riya
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginningsinfo695895
 
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...Suhani Kapoor
 
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...CedZabala
 
PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)ahcitycouncil
 
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Goa Escorts WhatsApp Number South Goa Call Girl … 8588052666…
Goa Escorts WhatsApp Number South Goa Call Girl … 8588052666…Goa Escorts WhatsApp Number South Goa Call Girl … 8588052666…
Goa Escorts WhatsApp Number South Goa Call Girl … 8588052666…nishakur201
 

Recently uploaded (20)

2024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 272024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 27
 
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Room
 
Rohini Sector 37 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 37 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 37 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 37 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Climate change and safety and health at work
Climate change and safety and health at workClimate change and safety and health at work
Climate change and safety and health at work
 
Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...
 
Call Girls In Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In  Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCeCall Girls In  Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
 
Fair Trash Reduction - West Hartford, CT
Fair Trash Reduction - West Hartford, CTFair Trash Reduction - West Hartford, CT
Fair Trash Reduction - West Hartford, CT
 
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
 
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
 
Human-AI Collaboration for Virtual Capacity in Emergency Operation Centers (E...
Human-AI Collaborationfor Virtual Capacity in Emergency Operation Centers (E...Human-AI Collaborationfor Virtual Capacity in Emergency Operation Centers (E...
Human-AI Collaboration for Virtual Capacity in Emergency Operation Centers (E...
 
VIP Call Girls Pune Vani 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Vani 8617697112 Independent Escort Service PuneVIP Call Girls Pune Vani 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Vani 8617697112 Independent Escort Service Pune
 
Item # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfItem # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdf
 
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up Number
 
How to Save a Place: 12 Tips To Research & Know the Threat
How to Save a Place: 12 Tips To Research & Know the ThreatHow to Save a Place: 12 Tips To Research & Know the Threat
How to Save a Place: 12 Tips To Research & Know the Threat
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
 
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
 
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
 
PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)
 
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
 
Goa Escorts WhatsApp Number South Goa Call Girl … 8588052666…
Goa Escorts WhatsApp Number South Goa Call Girl … 8588052666…Goa Escorts WhatsApp Number South Goa Call Girl … 8588052666…
Goa Escorts WhatsApp Number South Goa Call Girl … 8588052666…
 

Cyberware

  • 1. Cyber Warfare: Terms, Issues, Laws and Controversies Ensar Seker
  • 2. Objectives • Introduction • Cyber Terminology • Major Players in Cyber Space • Noticeable Cyber Attacks • Conclusion NATO: UNCLASSIFIED 2
  • 3. Introduction U.S. Intelligence Community ranked cyber attacks ahead of; • Terrorism • Transnational Organized Crime • Proliferation of Weapons of Mass Destruction 3
  • 6. Cyber Terminology Cyber Space All of the computer networks in the world and everything they connected and control. Cyber Warfare Actions by a nation state to penetrate another nation‟s computers or networks for the purpose of causing damage or disruption. 6
  • 7. Major Players in Cyber Space (UNITED STATES) 7 USCYBERCOM NSA FBI US-CERT NETCOM 24 AIR FORCE MARFORCYBER CYBERFOR ARCYBER INSCOM
  • 8. Major Players in Cyber Space (UNITED STATES) The Five Pillars 1 - Recognizing that the new domain for warfare is cyberspace similar to the other elements in the battlespace. 2 - Proactive defenses as opposed to passive defense. 3 - Critical infrastructure protection (CIP) to ensure the protection of critical infrastructure. 4 - The use of collective defense, which would provide the ability of early detection and to incorporate them into the cyberwarfare defense structure. 5 - Maintaining and enhancing the advantage of technological change. 8
  • 9. Major Players in Cyber Space (CHINA) 9 Ministry of Public Security People's Liberation Army Unit 61398 Ministry of State Security The National Computer Network Emergency Response Technical Team /Coordination Center of China
  • 10. Major Players in Cyber Space (CHINA) • China has developed a communications intelligence program called „Golden Shield‟ using new and advanced technologies to gather domestic and foreign intelligence. • PLA has announced the deployment of another crucial military team: a cyber security squad. Described as an “Blue Army”. • There are too many state-level cyber attacks from China to United States so those attacks are even named. Titan Rain is a U.S. code name for Chinese military cyber assaults against the U.S. 10
  • 11. Major Players in Cyber Space (RUSSIA) 11 Special Communications and Information Service Federal Agency of Government Communications and Information Main Intelligence Agency Federal Security Service
  • 12. Major Players in Cyber Space (RUSSIA) • Russian attacks are much more difficult to detect since they cover their tracks very well unlike their counterparts in China. • Russia holds a broad concept of cyber warfare, which includes intelligence, counterintelligence, deceit, disinformation, electronic warfare, debilitation of communications, degradation of navigation support, psychological pressure, degradation of information systems and propaganda. 12
  • 13. Major Players in Cyber Space (NORTH KOREA) 13 The Korean People's Army – Bureau 121
  • 14. Major Players in Cyber Space (NORTH KOREA) • North Korea has more than 5,000 hacker forces based on South Korean‟s reports. • Bureau 121 concentrates exclusively on digital warfare. • Primary intelligence targets are South Korea, Japan, and the United States. 14
  • 15. Major Players in Cyber Space (The Five Eyes Alliance) 15 National Security Agency UNITED STATES Communications Security Establishment CANADA Government Communications Security Bureau NEW ZEALAND Government Communications Headquarters UNITED KINGDOM Defence Signals Directorate AUSTRALIA
  • 16. Major Players in Cyber Space (HACKER GROUPS) 16 Equation Group Tailored Access Operations Elderwood Group Fancy Bear Dragonfly Tarh Andishan /Ajax Syrian Electronic Army Axiom Hidden LYNX Putter Panda
  • 17. Noticable Cyber Attacks (2007 Cyberattacks on Estonia) • Estonian parliament, banks, ministries, newspapers and broadcasters‟ network were attacked amid the country's disagreement with Russia about the relocation of the Bronze Soldier of Tallinn. • No less than 128 exceptional DDOS assaults focusing on internet conventions in Estonia • Internet traffic expanded from 20,000 packets to more than 4 million packets for every second. 17
  • 18. Noticable Cyber Attacks (2008 Cyberattacks on Georgia) • The Russian-Georgian War begun in August of 2008. • Before any gun was fired, cyber attacks were already hitting Georgia. • 54 websites in Georgia related to communications, finance, and the government were targeted immediately. • All communication channels were hacked for preventing Georgian public to be informed 18
  • 19. Noticable Cyber Attacks (2010 Cyberattacks on Myanmar) • DDOS attacks against to general election in Burma. • Before any gun was fired, cyber attacks This election was the first that Burma had had in 20 years. • The attacks were significantly larger than attacks against Estonia and Georgia in 2007 and 2008 respectively. 19
  • 20. Noticable Cyber Attacks (2010 Cyberattacks on Iran) • Operation Olympic Games was a covert and still unacknowledged campaign of sabotage by means of cyber disruption, directed at Iranian nuclear facilities by the United States and likely Israel. • Stuxnet and Flame malwares were developed to target industrial computer systems and was responsible for causing substantial damage to Iran's nuclear program. • Stuxnet specifically targets programmable logic controllers (PLCs). 20
  • 21. Noticable Cyber Attacks (2014 Cyberattacks on USA) • Operation Cleaver was a cyberwarfare covert operation targeting critical infrastructure organizations in the US and worldwide, allegedly planned and executed by Iran. • At least 17 US Electricity companies‟ systems were attacked, including four utilities, where hackers stole data and gained access to private networks. 21
  • 22. Noticable Cyber Attacks (2016 Cyberattacks on USA) • U.S. intelligence agencies' conclusion that Russia tried to influence the election by hacking people and institutions, including Democratic Party bodies. • Based on the reports, Russian President Vladimir Putin supervised his intelligence agencies' hacking of the U.S. presidential election and turned it from a general attempt to discredit American democracy. 22
  • 23. Noticable Cyber Attacks (Cyber Weapons) 23 STUXnet Great Cannon DuquFlame Mirai Wiper Regin ShammonTurla Rocra
  • 24. Conclusion • Cyber Warfare can obtain greater striking force when compared to traditional army. • Depending on the internet and network systems even more in the future, would make cyber space more vulnerable to cyber attacks. • As national security concern, cyber threats dramatically increase. 24
  • 25. 25