BY: AUSTIN NEIGH
WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically between two sovereign nations
POTENTIAL TARGETS OF ATTACKS/OPERATIONS Military networks and command centers Key Infrastructure Financial Institutions Trade Secrets/Classified Information Personal networks/devices
WHO’S CAPABLE? United States, U.K., Russia, China, and Iran are among several nations that have cyber units within their armed forces Nation/State sponsored hackers Experienced hackers may have capability to design and infect PCs and networks with various malicious software Organizations and individual hackers are more likely to be categorized under the term “cyber-terrorism”
SUCCESSFUL ATTACKS Widespread panic/chaos Shutdown or severally cripple important infrastructure Sabotage military installations or critical facilities Create an economic crisis, or cause billions of dollars in damage Preventing a nation from effectively conducting and carrying out military operations
EXAMPLES OF CYBER WARFARE US hacked into Serbian air defense systems A botnet in Estonia brought down government, business and media websites across the country. Believed to have originated from Russia Terabytes of information was stolen from U.S. military facilities by an unknown foreign party
CONTINUED EXAMPLES GhostNet, a cyber spy network, gained access to confidential information in over 100 countries belonging to government and private organizations STUXNET targets nuclear centrifuges at Iran’s nuclear enrichment facilities
STUXNET Computer worm discovered in June 2010 Believed to be the largest and costliest malware development in history Intended targets were industrial programmable logic controllers Introduced to an environment by an infected USB flash drive
STUXNET VIRUS
Norse is a leader in live attack intelligence Provide continuous intel to help organizations detect and block attacks that other systems miss There products are integrated into SIEM, IPS, and firewall products to improve overall performance and catch-rate of a security infrastructure
DEFENDING AGAINST ATTACKS US Cyber Command NATO Computer Incident Response Capability (NCIRC) Corporate IT Security Departments Business and Personal Security Products Norton Anti-Virus Security McAfee Internet Security Firewalls
ARE WE PREPARED FOR AN ATTACK Can never be 100% protected from an internet based attack Newer technology requires the ability to evolve and adapt to new threats U.S. Infrastructure remains highly vulnerable to all forms of cyber attacks Strategic cyber warfare does not distinguish between military and civilians
ISSUES WITH THE TERMS “CYBER WARFARE AND CYBER WAR” Due to interconnectedness of computer systems and networks around the world, there is no “winner” in this type of environment Terminology potentially motivates the use of a military response when it may not be an appropriate measure
SOURCES How Does Cyber Warfare Work? does-cyber-warfare-work/ does-cyber-warfare-work/ berdomain/ berdomain/