BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.

Slides:



Advertisements
Similar presentations
James D. Brown Chief Engineer and Senior Fellow Information Resource Management L-3 Communications.
Advertisements

Computer security Viruses Hacking Backups
 Someone who exercises playful ingenuity  Misusers of the internet who try to obtain or corrupt information; people who try to prevent it.
Security for Today’s Threat Landscape Kat Pelak 1.
CHINESE HACKERS. Where do they come from? In 2007 private security firm Mandiant was hired by the New York Times to trace cyber-attacks on their network.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
CYBERSPACE A Global War-fighting Domain Every minute of every day, Airmen in the United States Air Force are flying and fighting in cyberspace.
Rob Gaston 04/04/2013 CIS 150. Cyber Warfare  U.S. government security expert Richard A. Clarke, Cyber War (May 2010): "cyber warfare" is "actions by.
Cyberterrorism: The Bloodless War? Pat Mcgregor Chief Information Security Architect Intel Corporation 3 October 2001.
Assessing Actions Along the Spectrum of Cyberspace Operations
Australia and Cyber Warfare by Ian Dudgeon A presentation to the AIIA Queensland Branch 14 June 2011.
Cyber-Warfare Analyzed by: Josh Burleson Brian Epp Chrissy Miller Martin Vanis “Cyber attacks…is not in any way comparable to weapons of mass destruction.
HALDEBIQUE Geoffroy ROYER Johan  Crime motivated attacks  Hacktivism  Cyber Warfare.
Cyber Capabilities Example IT 298 / Bohman January 6 th, 2014.
CIAO July Critical Infrastructure Assurance Office Protecting America’s Cyberspace: Version 1.0 of the National Plan Jeffrey Hunker National.
Information Warfare Theory of Information Warfare
Protecting our Cyber Space Staying Ahead of the Game Basel Alomair National Center for Cybersecurity Technology (C4C) King Abdulaziz City for Science and.
Novel Information Attacks From “Carpet Bombings” to “Smart Bombs”
Network Security of The United States of America By: Jeffery T. Pelletier.
DuWayne Aikins Information Security Forum May 21, 2015 Cyber, A Militarized Domain: What is Means to Texas.
Cyber-Warfare: The Future is Now!
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
CYBER CRIME AND SECURITY TRENDS
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Maritime Cyber Risks – What is real, what is fiction?
Instilling rigor and imagination in analysis Countering the Iranian Nuclear Threat Stuxnet and its Broader Implications Randolph H. Pherson Mary C. Boardman.
Marine Industry Day 2015 Sector Command Center (24 hours): (504) National Response Center: Website:
A sophisticated Malware Arpit Singh CPSC 420
By: Sharad Sharma, Somya Verma, and Taranjit Pabla.
INFORMATION WARFARE. What is Information Warfare? “All actions taken to defend the military’s information-based processes, information systems and communications.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
E-Security: 10 Steps to Protect Your School’s Network NEN – the education network.
Jonathan Baulch  A worm that spreads via USB drives  Exploits a previously unknown vulnerability in Windows  Trojan backdoor that looks for a specific.
Cyber-Attack On Department Of Defense. Overview Washington has reported that there has been a widespread attack on Defense Department computers that may.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
Information Warfare Playgrounds to Battlegrounds.
Cyber Warfare Case Study: Estonia
Cyber Security Nevada Businesses Overview June, 2014.
Force Protection. What is Force Protection? Force protection (FP) is a term used by the US military to describe preventive measures taken to mitigate.
Cyber Warfare Situational Awareness & Best Defense Practices Presented by Hasan Yasar
VirusesViruses HackingHacking Back upsBack ups Stuxnet Stuxnet.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
Information Warfare Playgrounds to Battlegrounds.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
Battles in Cyber Space Dr Richard E Overill Department of Informatics.
Security Mindset Lesson Introduction Why is cyber security important?
NEXT GENERATION ATTACKS & EXPLOIT MITIGATIONS TECHNIQUES ID No: 1071 Name: Karthik GK ID: College: Sathyabama university.
Cyber Threat Dr. John P. Abraham Professor University of Texas Pan American.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
The Current State of Cyber Security and How to Defend Your Data.
DHS Publishes Report Saying Low but Persistent Risk of Cyber Attack on Energy Sector DHS REPORT ON ENERGY CYBERSECURITY April 6, 2016 | Ben Booker Source:
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
The Cyber Wars BRIAN ABDO. Geopolitical Agendas  Upswing in hacking with governmental agendas.  Their purpose is to discover information from the targeted.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Governments don’t Understand Cyber Warfare. We Need Hackers.
Brian Marks COSC 380. Cyber War  What is Cyber War?  What attacks have happened?  Could this happen to us?  What defenses are in place to stop it?
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Industrial Control System Cybersecurity
International Conflict & Cyber Security
Richard A. Clarke warned America once before about the havoc terrorism would wreak on our national security -- and he was right. Now he.
Stuxnet By Shane Serafin.
Network Security Fundamentals
CYBER SECURITY...
Cybersecurity Case Study STUXNET worm
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
Advanced Services Cyber Security 101 © ABB February, | Slide 1.
Object Oriented Programming and Software Engineering CIS016-2
Prepared By : Binay Tiwari
Richard A. Clarke warned America once before about the havoc terrorism would wreak on our national security -- and he was right. Now he.
Strategic threat assessment
Presentation transcript:

BY: AUSTIN NEIGH

WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically between two sovereign nations

POTENTIAL TARGETS OF ATTACKS/OPERATIONS Military networks and command centers Key Infrastructure Financial Institutions Trade Secrets/Classified Information Personal networks/devices

WHO’S CAPABLE? United States, U.K., Russia, China, and Iran are among several nations that have cyber units within their armed forces Nation/State sponsored hackers Experienced hackers may have capability to design and infect PCs and networks with various malicious software Organizations and individual hackers are more likely to be categorized under the term “cyber-terrorism”

SUCCESSFUL ATTACKS Widespread panic/chaos Shutdown or severally cripple important infrastructure Sabotage military installations or critical facilities Create an economic crisis, or cause billions of dollars in damage Preventing a nation from effectively conducting and carrying out military operations

EXAMPLES OF CYBER WARFARE US hacked into Serbian air defense systems A botnet in Estonia brought down government, business and media websites across the country. Believed to have originated from Russia Terabytes of information was stolen from U.S. military facilities by an unknown foreign party

CONTINUED EXAMPLES GhostNet, a cyber spy network, gained access to confidential information in over 100 countries belonging to government and private organizations STUXNET targets nuclear centrifuges at Iran’s nuclear enrichment facilities

STUXNET Computer worm discovered in June 2010 Believed to be the largest and costliest malware development in history Intended targets were industrial programmable logic controllers Introduced to an environment by an infected USB flash drive

STUXNET VIRUS

Norse is a leader in live attack intelligence Provide continuous intel to help organizations detect and block attacks that other systems miss There products are integrated into SIEM, IPS, and firewall products to improve overall performance and catch-rate of a security infrastructure

DEFENDING AGAINST ATTACKS US Cyber Command NATO Computer Incident Response Capability (NCIRC) Corporate IT Security Departments Business and Personal Security Products Norton Anti-Virus Security McAfee Internet Security Firewalls

ARE WE PREPARED FOR AN ATTACK Can never be 100% protected from an internet based attack Newer technology requires the ability to evolve and adapt to new threats U.S. Infrastructure remains highly vulnerable to all forms of cyber attacks Strategic cyber warfare does not distinguish between military and civilians

ISSUES WITH THE TERMS “CYBER WARFARE AND CYBER WAR” Due to interconnectedness of computer systems and networks around the world, there is no “winner” in this type of environment Terminology potentially motivates the use of a military response when it may not be an appropriate measure

SOURCES How Does Cyber Warfare Work? does-cyber-warfare-work/ does-cyber-warfare-work/ berdomain/ berdomain/