Download presentation
Presentation is loading. Please wait.
Published byRaymond Fisher Modified over 8 years ago
1
BY: AUSTIN NEIGH
2
WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically between two sovereign nations
3
POTENTIAL TARGETS OF ATTACKS/OPERATIONS Military networks and command centers Key Infrastructure Financial Institutions Trade Secrets/Classified Information Personal networks/devices
4
WHO’S CAPABLE? United States, U.K., Russia, China, and Iran are among several nations that have cyber units within their armed forces Nation/State sponsored hackers Experienced hackers may have capability to design and infect PCs and networks with various malicious software Organizations and individual hackers are more likely to be categorized under the term “cyber-terrorism”
5
SUCCESSFUL ATTACKS Widespread panic/chaos Shutdown or severally cripple important infrastructure Sabotage military installations or critical facilities Create an economic crisis, or cause billions of dollars in damage Preventing a nation from effectively conducting and carrying out military operations
6
EXAMPLES OF CYBER WARFARE 1998- US hacked into Serbian air defense systems 2007- A botnet in Estonia brought down government, business and media websites across the country. Believed to have originated from Russia 2007- Terabytes of information was stolen from U.S. military facilities by an unknown foreign party
7
CONTINUED EXAMPLES 2009- GhostNet, a cyber spy network, gained access to confidential information in over 100 countries belonging to government and private organizations 2010- STUXNET targets nuclear centrifuges at Iran’s nuclear enrichment facilities
8
STUXNET Computer worm discovered in June 2010 Believed to be the largest and costliest malware development in history Intended targets were industrial programmable logic controllers Introduced to an environment by an infected USB flash drive
9
STUXNET VIRUS https://www.youtube.com/watch?v=DSMOs7CF1Eo
10
http://map.ipviking.com/ Norse is a leader in live attack intelligence Provide continuous intel to help organizations detect and block attacks that other systems miss There products are integrated into SIEM, IPS, and firewall products to improve overall performance and catch-rate of a security infrastructure
11
DEFENDING AGAINST ATTACKS US Cyber Command NATO Computer Incident Response Capability (NCIRC) Corporate IT Security Departments Business and Personal Security Products Norton Anti-Virus Security McAfee Internet Security Firewalls
12
ARE WE PREPARED FOR AN ATTACK Can never be 100% protected from an internet based attack Newer technology requires the ability to evolve and adapt to new threats U.S. Infrastructure remains highly vulnerable to all forms of cyber attacks Strategic cyber warfare does not distinguish between military and civilians
13
ISSUES WITH THE TERMS “CYBER WARFARE AND CYBER WAR” Due to interconnectedness of computer systems and networks around the world, there is no “winner” in this type of environment Terminology potentially motivates the use of a military response when it may not be an appropriate measure
14
SOURCES How Does Cyber Warfare Work? http://www.forbes.com/sites/quora/2013/07/18/how- does-cyber-warfare-work/ http://www.forbes.com/sites/quora/2013/07/18/how- does-cyber-warfare-work/ http://www.stratcom.mil/factsheets/2/Cyber_Command/ http://www.defense.gov/home/features/2013/0713_cy berdomain/ http://www.defense.gov/home/features/2013/0713_cy berdomain/ http://www.dhs.gov/topic/cybersecurity http://www.nato.int/cps/en/natolive/topics_78170.htm
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.