DIGITAL
WARFARE
Yang Zhe 1155174022
Gao Jiaqi 1155157043
Yu Jilin 1155173082
Wang Yuren 1155165549
Wang Tongtong 1155173769
What is digital warfare?
Digital Warfare uses internet-based weapons
by state or nonstate actors that steal the
government’s information or resources,
destroy its ability to function, and cause it to
harm itself or another entity.
HISTORY
1986
Infancy
1980s-90s
Militarization
2000s-present
interim period
pre and post 9/11
2007 & 2008
HISTORY
Militarization
2000s-present
2007 & 2008
formation of cyber strategies and cyber
militarization around the world
reference:[2][3][4]
0
1
Malware
• damage or disable computer systems
• sensitive information or to disrupt
critical systems
High altitude balloons
• deploy and operate communication equipment
• collect intelligence or surveillance data
Advanced Persistent
Threat (APT) Tools
• gain unauthorized access to a network
• remain undetected in extended period
0
2
0
3
0
4
0
5
0
6
Distributed Denial of
Service (DDoS) Attacks
Zero-Day Exploits
Other Tools
THE TOOLS OF CYBER WARFARE
• overwhelm a server or network with a
flood of traffic
• unavailable to users and disrupting
critical services
• unknown to the vendor
• gain unauthorized access to a system
• main function is similar to malware
• Artificial Inteligence
• Phishing
• etc .........
● Cyber warfare has started
since 1991
● Implementing various
types of cyber-attacks,
e.g. the DDoS attacks and
the APT tools
Russian–Ukrainian Digital-Warfare
Malware Attacks
Wiper Malware
Files, data and all temporary
files associated with these
data
Boot sector of the OS and
any backup mechanism
• Delete or overwrite
them
• If not, encrypt them
without keys
• They are recovery and protection
functions in your computer
• Along with the deletion or
encryption process, targeted file
can be completely exterminated
Digital War
China VS U.S.
‘Spy’ Balloon Fall Down
High-Altitude Balloon
High-altitude Balloons are
filled with hydrogen or helium
on the ground, depending on
the weight of the balloon, local
air pressure, temperature, and
desired rate of ascent.
DIGITAL
SECURITY
Recommendation
WANG,Tongtong
1155173769
Keep your software and systems fully up to date
Often cyber attacks happen because your
systems or software aren’t fully up to date,
leaving weaknesses. So cybercriminals
exploit these weaknesses to gain access to
your network. Once they are in – it’s often
too late to take preventative action.
To counteract this, it’s smart to invest in
a patch management system that will
manage all software and system updates,
keeping your system resilient and up to date.
SECURITY
COMPANY
CYBER SECURITY Recommendation
Having control over who can access your
network is really really important. Somebody
can simply walk into your office or enterprise
and plug in a USB key containing infected files
into one of your computers allowing them
access to your entire network or infect it.
Control access to your systems
Endpoint protection protects networks that are
remotely bridged to devices. Mobile devices,
tablets and laptops that are connected to
corporate networks give access paths to security
threats. These paths need protected with specific
endpoint protection software.
Ensure Endpoint Protection
SUMMARY
Example 1:
Ukraine and Russia
digital warfare
Wiper Malware
Protection
1.
2.
3.
Advanced Persistent Threat (APT)
Distributed Denial of Service (DDoS)
Zero-Day Exploits
Example 2:
American high-
altitude balloon
THANKS!
REFERENCE
[1]Paulo Shakarian, Jana Shakarian, Andrew Ruef, Chapter 1 - Cyber Warfare: Here and Now, Editor(s): Paulo
Shakarian, Jana Shakarian, Andrew Ruef, Introduction to Cyber-Warfare, Syngress, 2013, Pages 1-8, ISBN
9780124078147, https://doi.org/10.1016/B978-0-12-407814-7.00001-4.
[2]Leyden, J. (2006, January 19). PC virus celebrates 20th birthday. The Register® - Biting the hand that feeds
IT. Retrieved February 18, 2023, from https://www.theregister.com/2006/01/19/pc_virus_at_20/
[3]Haizler, O. (2017). The United States’ cyber warfare history: Implications on modern cyber operational
structures and policymaking. Cyber, Intelligence, and Security, 1(1), 31-45.
[4]Stiennon, R. (2015). A short history of cyber warfare. In Cyber Warfare (pp. 7-32). Routledge.
[5]Norton. (n.d.). What is malware? Definition and examples. https://us.norton.com/internetsecurity-malware-
definition-examples.html
[6]Digital Guardian. (n.d.). What is a DoS attack? https://digitalguardian.com/blog/what-dos-attack
[7]Norton. (n.d.). What is phishing? How to recognize and avoid phishing scams.
https://us.norton.com/internetsecurity-online-scams-phishing-scams.html
[8]Norton. (n.d.). What is social engineering? Definition and examples. https://us.norton.com/internetsecurity-
emerging-threats-what-is-social-engineering.html
[9]Digital Guardian. (n.d.). What are advanced persistent threats (APTs)?
https://digitalguardian.com/blog/what-are-advanced-persistent-threats-apts
REFERENCE
[10]CSO Online. (2019, October 28). What is cyber espionage? How nations use cyber spying against one
another. https://www.csoonline.com/article/3516924/what-is-cyber-espionage-how-nations-use-cyber-spying-
against-one-another.html
[11]Dark Reading. (2018, August 10). Physical attacks against digital infrastructure.
https://www.darkreading.com/vulnerabilities---threats/physical-attacks-against-digital-infrastructure/d/d-
id/1331589
[12]“How Does Wiper Malware Work?,” Packetlabs, Apr. 14, 2022. https://www.packetlabs.net/posts/how-
does-wiper-malware-work/ (accessed Feb. 23, 2023).
[13]“Native technologies used in Russia-Ukraine cyber attacks,” IT Brief Australia.
https://itbrief.com.au/story/native-technologies-used-in-russia-ukraine-cyber-attacks
[14]“How Does Wiper Malware Work?,” Packetlabs, Apr. 14, 2022. https://www.packetlabs.net/posts/how-
does-wiper-malware-work/ (accessed Feb. 23, 2023).
[15]“Native technologies used in Russia-Ukraine cyber attacks,” IT Brief Australia.
https://itbrief.com.au/story/native-technologies-used-in-russia-ukraine-cyber-attacks
[16]High-Altitude Balloon.” Wikipedia, Wikimedia Foundation, 13 Feb. 2023,
https://en.wikipedia.org/wiki/High-altitude_balloon.

Digital warfare by R6.pptx

  • 1.
    DIGITAL WARFARE Yang Zhe 1155174022 GaoJiaqi 1155157043 Yu Jilin 1155173082 Wang Yuren 1155165549 Wang Tongtong 1155173769
  • 2.
    What is digitalwarfare? Digital Warfare uses internet-based weapons by state or nonstate actors that steal the government’s information or resources, destroy its ability to function, and cause it to harm itself or another entity.
  • 3.
  • 4.
    HISTORY Militarization 2000s-present 2007 & 2008 formationof cyber strategies and cyber militarization around the world reference:[2][3][4]
  • 5.
    0 1 Malware • damage ordisable computer systems • sensitive information or to disrupt critical systems High altitude balloons • deploy and operate communication equipment • collect intelligence or surveillance data Advanced Persistent Threat (APT) Tools • gain unauthorized access to a network • remain undetected in extended period 0 2 0 3 0 4 0 5 0 6 Distributed Denial of Service (DDoS) Attacks Zero-Day Exploits Other Tools THE TOOLS OF CYBER WARFARE • overwhelm a server or network with a flood of traffic • unavailable to users and disrupting critical services • unknown to the vendor • gain unauthorized access to a system • main function is similar to malware • Artificial Inteligence • Phishing • etc .........
  • 6.
    ● Cyber warfarehas started since 1991 ● Implementing various types of cyber-attacks, e.g. the DDoS attacks and the APT tools Russian–Ukrainian Digital-Warfare
  • 7.
  • 8.
    Files, data andall temporary files associated with these data Boot sector of the OS and any backup mechanism • Delete or overwrite them • If not, encrypt them without keys • They are recovery and protection functions in your computer • Along with the deletion or encryption process, targeted file can be completely exterminated
  • 9.
  • 10.
  • 11.
    High-Altitude Balloon High-altitude Balloonsare filled with hydrogen or helium on the ground, depending on the weight of the balloon, local air pressure, temperature, and desired rate of ascent.
  • 12.
  • 13.
    Keep your softwareand systems fully up to date Often cyber attacks happen because your systems or software aren’t fully up to date, leaving weaknesses. So cybercriminals exploit these weaknesses to gain access to your network. Once they are in – it’s often too late to take preventative action. To counteract this, it’s smart to invest in a patch management system that will manage all software and system updates, keeping your system resilient and up to date. SECURITY COMPANY
  • 14.
    CYBER SECURITY Recommendation Havingcontrol over who can access your network is really really important. Somebody can simply walk into your office or enterprise and plug in a USB key containing infected files into one of your computers allowing them access to your entire network or infect it. Control access to your systems Endpoint protection protects networks that are remotely bridged to devices. Mobile devices, tablets and laptops that are connected to corporate networks give access paths to security threats. These paths need protected with specific endpoint protection software. Ensure Endpoint Protection
  • 15.
    SUMMARY Example 1: Ukraine andRussia digital warfare Wiper Malware Protection 1. 2. 3. Advanced Persistent Threat (APT) Distributed Denial of Service (DDoS) Zero-Day Exploits Example 2: American high- altitude balloon
  • 16.
  • 17.
    REFERENCE [1]Paulo Shakarian, JanaShakarian, Andrew Ruef, Chapter 1 - Cyber Warfare: Here and Now, Editor(s): Paulo Shakarian, Jana Shakarian, Andrew Ruef, Introduction to Cyber-Warfare, Syngress, 2013, Pages 1-8, ISBN 9780124078147, https://doi.org/10.1016/B978-0-12-407814-7.00001-4. [2]Leyden, J. (2006, January 19). PC virus celebrates 20th birthday. The Register® - Biting the hand that feeds IT. Retrieved February 18, 2023, from https://www.theregister.com/2006/01/19/pc_virus_at_20/ [3]Haizler, O. (2017). The United States’ cyber warfare history: Implications on modern cyber operational structures and policymaking. Cyber, Intelligence, and Security, 1(1), 31-45. [4]Stiennon, R. (2015). A short history of cyber warfare. In Cyber Warfare (pp. 7-32). Routledge. [5]Norton. (n.d.). What is malware? Definition and examples. https://us.norton.com/internetsecurity-malware- definition-examples.html [6]Digital Guardian. (n.d.). What is a DoS attack? https://digitalguardian.com/blog/what-dos-attack [7]Norton. (n.d.). What is phishing? How to recognize and avoid phishing scams. https://us.norton.com/internetsecurity-online-scams-phishing-scams.html [8]Norton. (n.d.). What is social engineering? Definition and examples. https://us.norton.com/internetsecurity- emerging-threats-what-is-social-engineering.html [9]Digital Guardian. (n.d.). What are advanced persistent threats (APTs)? https://digitalguardian.com/blog/what-are-advanced-persistent-threats-apts
  • 18.
    REFERENCE [10]CSO Online. (2019,October 28). What is cyber espionage? How nations use cyber spying against one another. https://www.csoonline.com/article/3516924/what-is-cyber-espionage-how-nations-use-cyber-spying- against-one-another.html [11]Dark Reading. (2018, August 10). Physical attacks against digital infrastructure. https://www.darkreading.com/vulnerabilities---threats/physical-attacks-against-digital-infrastructure/d/d- id/1331589 [12]“How Does Wiper Malware Work?,” Packetlabs, Apr. 14, 2022. https://www.packetlabs.net/posts/how- does-wiper-malware-work/ (accessed Feb. 23, 2023). [13]“Native technologies used in Russia-Ukraine cyber attacks,” IT Brief Australia. https://itbrief.com.au/story/native-technologies-used-in-russia-ukraine-cyber-attacks [14]“How Does Wiper Malware Work?,” Packetlabs, Apr. 14, 2022. https://www.packetlabs.net/posts/how- does-wiper-malware-work/ (accessed Feb. 23, 2023). [15]“Native technologies used in Russia-Ukraine cyber attacks,” IT Brief Australia. https://itbrief.com.au/story/native-technologies-used-in-russia-ukraine-cyber-attacks [16]High-Altitude Balloon.” Wikipedia, Wikimedia Foundation, 13 Feb. 2023, https://en.wikipedia.org/wiki/High-altitude_balloon.