Download presentation
Presentation is loading. Please wait.
Published byEmil O’Connor’ Modified over 9 years ago
1
Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions May 16, 2015 DRAFT1 Chapter 14: Cyber Warfare: An Architecture for Deterrence
2
Introduction to Cyber Warfare and Cyber Deterrence Over 120 countries are actively conducting cyber operations, primarily espionage It is estimated that the Chinese have over 100,000 activity duty cyber warriors, and over independent 80,000 hackers, who often carry out mission in the national interest As stated in CNCI #10, cyber deterrence is a “strategy that will deter interference and attack in cyberspace… and developing appropriate responses by both state and non-state actors.” 5/16/2015 DRAFT2 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions
3
Methodology and Assumptions Cyber deterrence is a cutting edge research problem, a very difficult one, in particular because attributing cyber activities is so difficult due to the technology This research approach considers: –National Security Goals –Cyber Warfare Laws & Treaties –Strategic Functions –Solutions Architecture for Cyber Deterrence –Technical Functions 5/16/2015 DRAFT3 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions
4
Methodology & Assumptions 2 5/16/2015 DRAFT4 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions
5
Cyber Deterrence Challenges Assigning attribution –Internet technology makes it relatively easy to misdirect attribution to other parties Unpredictability of cyber attack impacts Potential damage due to counter- retaliation Nation states, non-state actors, and individuals are at a peer level, all capable of waging attacks No clear legal framework exists 5/16/2015 DRAFT5 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions
6
Legal and Treaty Assumptions Legality of cyber operations should be clarified in national and international treaties (allowing for non-disclosure) Monitoring of suspected remote servers should be allowed,and attacked if they are non-life- critical, because servers used for attack may belong to unaware 3 rd parties Use of 3 rd party servers should be defined unlawful according to the laws of war International investigations should be enabled 5/16/2015 DRAFT6 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions
7
5/16/2015 DRAFT7 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions Cyber Deterrence Strategy Used in the book With permission from The RAND Corporation [Libicki 2010]
8
Cyber Deterrence Retaliation Probabilities (Sample) 5/16/2015 DRAFT8 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions Used in the book With permission from The RAND Corporation [Libicki 2010]
9
Reference Model 5/16/2015 DRAFT9 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions
10
Attacker Conceptual Architecture 5/16/2015 DRAFT10 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions
11
Conceptual Application Architecture: Rapid Attribution 5/16/2015 DRAFT11 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions
12
Conceptual Information Architecture: Sample Record RECORD: 1 {'IPv4 Address': '173.201.21.161', 'FTP Open on Port': '21', 'RDP Open on Port': '3389', 'Ping Response':'Alive', 'Attack Organization': 'Aurora', 'Attack Role': 'Control Server'} RECORD: 2 {'IPv4 Address': '69.164.192.46', 'Ping Response':'Alive', 'Attack Organization': 'Aurora', 'Attack Role': 'Control Server'} RECORD: 3 {'IPv4 Address': '168.95.1.1', 'Ping Response':'Alive', 'Attack Organization': 'Aurora', 'Attack Role': 'Control Server'} RECORD: 4 {'IPv4 Address': '203.69.66.1', 'Ping Response':'Alive', 'Attack Organization': 'Aurora', 'Attack Role': 'Control Server’} 5/16/2015 DRAFT12 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions
13
Architectural Prototypes Bot with Threaded Scanning Botnet with Distributed Scanning 5/16/2015 DRAFT13 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions Performance ActualsPerformance Projected
14
REVIEW CHAPTER SUMMARY Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions 5/16/2015 DRAFT14
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.