Download presentation
Presentation is loading. Please wait.
1
International Conflict & Cyber Security
Project: Cybersecurity & Liberal Arts Dr. Xenia Mountrouidou
2
Outline Cyberwarfare Malware Malware Case Study: Stuxnet
Network attacks Network Attack Case Study: DDoS
3
Cyberwar What is cyberwar (cyberwarfare)?
4
Cyberwarfare Cyberwarfare is Internet-based conflict involving politically motivated attacks on information and information systems. Cyberwarfare attacks can disable official websites and networks, disrupt or disable essential services, steal or alter classified data, and cripple financial systems -- among many other possibilities. Give at least one example of cyberwarfare in recent news that you have read.
5
Malware Software that is intended to damage or disable computers and computer systems. Can you think of any examples? It can be transferred through computer networks. How do you think this is done? Examples: virus, ransomware, worms, trojans, backdoors, etc. Students can research what these software does. How? Via s, software that can move through internet cables (worm), clicking on an infected site, etc.
6
Malware Case Study: Stuxnet
Stuxnet is a famous computer worm that was first discovered in June of It was used to sabotage Iran’s nuclear enrichment facilities. In cyber security, an undisclosed vulnerability in a system is called a “zero day.” Stuxnet exploited several different zero days to change the way nuclear facilities were operating while reporting that everything was operating normally. June 2011
7
Malware Case Study: Stuxnet
Stuxnet is rumored to be the product of a collaboration between the US and Israel to sabotage Iran. What are the implications of this? How likely is it for an attack like Stuxnet to happen again in your opinion? Justify your answer. Stuxnet: a cyber biological weapon? Since the attacks, Iran has amassed a group of hackers to get more involved in cyber warfare, and has been rumored to be behind several attacks on US banks in retaliation.
8
Computer Network Attacks
Passive: Scanning, Reconnaissance Active: Distributed Denial of Service Spoofing Man in the middle Students can research and discuss about different attacks
9
Case Study Computer Network Attacks: DDoS
Distributed Denial of Service Traffic flood Makes resources (e.g. websites) unavailable to users Can target small and large businesses Stuxnet had a very specific target, and an average business or computer user is not likely to have problems with it. But DDoS attacks are much more common. A DDoS attack is when a flood od traffic is sent to a target to make its resources unavailable to its users. Like when a crowd of people all try to go through a door at once. DDoS attacks are used to shut down businesses websites temporarily, causing them to lose traffic.
10
Case Study Computer Network Attacks: DDoS Mirai Botnet
Large distributed denial of service attack – GBps, one billion bytes per second Weaponized the Internet of Things devices: web cameras etc. Took down websites such as: Amazon, Spotify, Twitter, Reddit Code was distributed openly in hack forums Mirai means “the future” in Japanese
11
Mirai on Oct What does this mean for you? What are the implications four our society? What are the consequences of connecting more devices to the internet? Are there any positive effects of interconnected devices or should we just disconnect these?
12
Case Study Computer Network Attacks: DDoS
In a survey of 270 North American companies, 45% said they have experienced a DDoS attack at some point in time About 2/3 of DDoS attacks last 6 hours or more Cost of a DDoS attack estimated at $40,000/hr Non-financial costs Hardware Customer trust Loss of data DDoS attacks are fairly common and can last for several hours. Because hey cost around $40,000/hr, the average cost of a DDoS attack is around $500,000. DDoS attacks also cause damage that is not financial. You may have to replace hardware, lose your customer’s trust, or even have theft of important data.
13
Case Study Computer Network Attacks: DDoS
Watch the attacks for a while. What trends do you notice? What do they show? The second map is the live one. After watching it for a while, it should become obvious that the US is the top attacker and victim. This may be because many big global corporations are in the US, and the US has many political enemies who want to attack the US. The importance of this is to show that DDoS attacks are global, and that attacks are often from one country to another. Remember Iran hiring an “army” of hackers to counterattack the US?
14
Rules of cyberwarfare When does a nation engage in cyber warfare?
When does a nation engage in actual warfare caused by a cyber incident? Who are the non combatant in a cyber war? Governments & cyberwarfare Implications of cyberwar
15
Works Cited Cybercrime the-worst-cases-so-far/ Kushner, David. "The Real Story of Stuxnet." IEEE Spectrum: Technology, Engineering, and Science News. IEEE, 26 Feb Web. 30 May 2016. Marciano, Christine. "How Much Does Cyber/data Insurance Cost?" Data Breach Insurance. Data Breach Insurance, 1 Feb Web. 29 May Matthews, Tim. "Incapsula Survey : What DDoS Attacks Really Cost Businesses." © Incapsula, Inc All Rights Reservedontents (n.d.): n. pag Web. 29 May 2016. Sanger, David E. "Obama Order Sped Up Wave of Cyberattacks Against Iran." The New York Times. The New York Times, 31 May Web. 29 May 2016. The hacked world Pax Technica, Phillip Howard
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.