Cyber Security, Cyber Warfare

Amit  Anand
Amit AnandIPS à GOI

Cyber Security, India, Civil Services Notes, IAS

Cyber Security
Amit Kumar Anand
www.amitkanand.com
September 21, 2016
1 Cyber Warfare
• Attacking the information systems of
other countries for espionage and for dis-
rupting their critical infrastructure.
• Attacks on websites of Estonia in 2007
and Georgia in 2008.
2 Cyber Crime
• Use of cyber space for criminal activities.
e.g. financial fraud, identity theft, mor-
phing etc.
• Information Technology Act (IT Act)
2000 confers extra territorial jurisdiction
on Indian courts and empowers them to
take cognizance of offences committed
outside India even by foreign nationals.
• Stuxnet targeted nuclear facilities of Iran.
3 Cyber Terrorism
• Use of cyber space by terrorists for com-
munication, command, and control, pro-
paganda, recruitment, training and fund-
ing purposes.
• ISIS
4 Cyber Espionage
• Spying and surveillance over cyber space.
• Titan rain - Series of coordinated at-
tacks on American computer systems
since 2003. China was blamed for this.
• Project PRISM.
5 Securing Cyberspace
• An effective cyber deterrence strategy
will include deterrence by denial as
well as penalty by punishment.
• Deterrence by denial will rely on strong
defences. i.e. the capabilities to bounce
back are strong.
• Deterrence by punishment relies on the
ability to counter-attack.
• If the attacker knows retaliation would be
“certain, severe and immediate”, it will
deter him.
• In cyberspace, where anonymity is the
key, it is difficult to identify precisely who
the attacker is. Non-attribution is the
fundamental weakness of the cyber de-
terrence argument.
6 India’s steps for securing
cyberspace
• National Cyber Security Policy 2013.
• National Cyber Security Assurance
Framework under implementation.
• National Cyber Security Coordinator ap-
pointed in 2015.
• National Critical Information Infrastruc-
ture Protection Centre (NCIIPC) set up.
• National Cyber Coordination Centre
(NCCC) set up.
• Regular dialogue between government
and private sector.
1
• New cyber security curricula introduced
in colleges.
• Cybersecurity R&D policy under active
consideration of government.
• Indian Computer Emergency Response
Team (CERT-In).
7 Clausewitzian Trinity
• Trinity held the key to victory in the war
1. military or means to fight war.
2. people or support for war in terms
of manpower and finance.
3. political instrument or government
to provide leadership and direction
in war.
• if these three tendencies are active and
interacting a nation can withstand any
aggression.
• if any of the trinity is completely de-
stroyed,the trinity is resilient enough the
other two tendencies would revive it back
and the trinity will survive.
• Today, all three tendencies are exten-
sively dependent on information and in-
formation assets.
• Modern nations are dependent on infor-
mation systems from military systems to
household essentials.
• the three tendencies of the Clausewitzian
Trinity are becoming extensively suscep-
tible to strategic information warfare.
• if all the three tendencies are simultane-
ously attacked, or in conventional terms
are subjected to parallel warfare in cy-
berspace, then it would generate a cas-
cade effect, inducing strategic paralysis,
and the victim nation would crumble as
a system, resulting in chaos and mayhem.
• Modern militaries rely extensively on in-
formation systems. Command, Control,
Communication, Computer, Intelligence,
Surveillance, Reconnaissance (C4SIR);
Strategic Information Dissemination Sys-
tems (SIDS); Net Centric Warfare/ Net-
work Enabled Operations (NCW/NEO);
Global Positioning System (GPS); Bat-
tle Field Surveillance Radar (BFSR),
Surveillance satellites, Global Command
and Control Systems (GCCS).
• These information assets acts as force
multiplier but at the same time are sus-
ceptible to attack.
• Stuxnet, Duqu malware.
• Modern societies are dependent on infor-
mation infrastructures.
• Critical infrastructures of nations are de-
pendent on information systems. Power
stations on Supervisory Control and Data
Acquisition (SCADA) and Distributed
Control System (DCS). Air Traffic Con-
trol, transportation systems, navigation
systems, banking infrastructure, stock
exchanges.
• Sudden disappearance of information re-
source from a information dependent so-
ciety in the event of cyber attack would
render people in the state of shock. e.g.
they cannot contact their near one due to
loss of communication systems.
• Governments acts as instrument of po-
litical direction and play critical role in
steering the nation.
• Law enforcement agencies depend in
criminal databases.
• Media is important linkage between gov-
ernment and public.
• e-governance.
• Media networks could be used to spread
disinformation. Psychological Opera-
tions (PSYOPS) in cyberspace.
• Potential further exacerbated with the
advent of social media and attack vec-
tors such as social bots for manipulation
of public opinion.
2
• PSYOPS can be used to induce fear,
chaos, misconception and division of per-
ceptions within a country which could
result in political upheavals and mass
movements. e.g. Role of Twitter in 2009
upheavals in Iran and Belarus.
• These three tendencies of the Trinity
form the core of a nation, and hence to
destroy a nation, it is important that all
the three be destroyed.
• Their dependence on the cyberspace
makes them a perfect target for strategic
warfare in cyberspace.
• All the three tendencies of the Trinity
should be simultaneously destroyed, as
being a resilient system the chances of
revival of the Trinity and the failure of
the attack to achieve a strategic effect are
very high.
8 Fifth Domain of War
• The potency of this threat has compelled
almost every country to develop capabil-
ities in the cyber domain, as is the case
for land, air, sea and space.
• By the end of 2008 nearly 140 countries
possessed varying degrees of cyber attack
capabilities. [Spy Ops]
• India on its growth path is vulnerable.
Located in an unstable region where the
larger neighbours possess this capacity, it
is logical to assume that the country is
under serious threat and constant attack.
3

Recommandé

Information warfare, assurance and security in the energy sectors par
Information warfare, assurance  and security in the energy sectorsInformation warfare, assurance  and security in the energy sectors
Information warfare, assurance and security in the energy sectorsLove Steven
2K vues35 diapositives
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp... par
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...Cyber Security Alliance
4K vues70 diapositives
Information warfare and information operations par
Information warfare and information operationsInformation warfare and information operations
Information warfare and information operationsClifford Stone
3.1K vues340 diapositives
NSA Journal of Information Warfare par
NSA Journal of Information WarfareNSA Journal of Information Warfare
NSA Journal of Information WarfareDavid Sweigert
1.8K vues115 diapositives
Francesca Bosco, Le nuove sfide della cyber security par
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityAndrea Rossetti
1.8K vues60 diapositives
Computers as weapons of war par
Computers as weapons of warComputers as weapons of war
Computers as weapons of warMark Johnson
754 vues5 diapositives

Contenu connexe

Tendances

Asymmetric threat 5_paper par
Asymmetric threat 5_paperAsymmetric threat 5_paper
Asymmetric threat 5_paperMarioEliseo3
7.5K vues40 diapositives
Research in Information Security and Information Warfare- The economics, warf... par
Research in Information Security and Information Warfare- The economics, warf...Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Quinnipiac University
1.3K vues30 diapositives
Cyber War ( World War 3 ) par
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )Sameer Paradia
3.8K vues15 diapositives
Honeypots in Cyberwar par
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in CyberwarMehdi Poustchi Amin
859 vues101 diapositives
The Information Warfare: how it can affect us par
The Information Warfare: how it can affect usThe Information Warfare: how it can affect us
The Information Warfare: how it can affect usLuis Borges Gouveia
9.9K vues26 diapositives
Kenneth geers-sun-tzu-and-cyber-war par
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warMarioEliseo3
1.9K vues23 diapositives

Tendances(20)

Asymmetric threat 5_paper par MarioEliseo3
Asymmetric threat 5_paperAsymmetric threat 5_paper
Asymmetric threat 5_paper
MarioEliseo37.5K vues
Research in Information Security and Information Warfare- The economics, warf... par Quinnipiac University
Research in Information Security and Information Warfare- The economics, warf...Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...
Kenneth geers-sun-tzu-and-cyber-war par MarioEliseo3
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-war
MarioEliseo31.9K vues
Understanding the Methods behind Cyber Terrorism par Maurice Dawson
Understanding the Methods behind Cyber TerrorismUnderstanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber Terrorism
Maurice Dawson618 vues
Cyber terrorism fact or fiction - 2011 par hassanzadeh20
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
hassanzadeh201.9K vues
Cyber Warfare - Jamie Reece Moore par Jamie Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
Jamie Moore1.6K vues
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY par Talwant Singh
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
Talwant Singh1K vues
Event: George Washington University -- National Security Threat Convergence: ... par Chuck Brooks
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
Chuck Brooks294 vues
Cyber war par Praveen
Cyber warCyber war
Cyber war
Praveen 1.1K vues

En vedette

How the Social Sciences are Used in Modern Warfare par
How the Social Sciences are Used in Modern WarfareHow the Social Sciences are Used in Modern Warfare
How the Social Sciences are Used in Modern WarfareMontgomery McFate
198 vues3 diapositives
Portifolio Comingersoll par
Portifolio ComingersollPortifolio Comingersoll
Portifolio ComingersollEng° Paulo Silva
444 vues17 diapositives
Fundraising & Szponzoráció par
Fundraising & SzponzorációFundraising & Szponzoráció
Fundraising & SzponzorációKrisztina Ilosfai
436 vues15 diapositives
SMART customized analytics dashboard par
SMART customized analytics  dashboardSMART customized analytics  dashboard
SMART customized analytics dashboardCeltycs
549 vues8 diapositives
About the GCR par
About the GCRAbout the GCR
About the GCRGCRclinics
353 vues12 diapositives
скан0085 par
скан0085скан0085
скан0085Mikhail Bublik
118 vues1 diapositive

En vedette(20)

How the Social Sciences are Used in Modern Warfare par Montgomery McFate
How the Social Sciences are Used in Modern WarfareHow the Social Sciences are Used in Modern Warfare
How the Social Sciences are Used in Modern Warfare
SMART customized analytics dashboard par Celtycs
SMART customized analytics  dashboardSMART customized analytics  dashboard
SMART customized analytics dashboard
Celtycs549 vues
STEP Conference 2015 - Alex Macaulay, SEStran - The role of Regional Transpor... par STEP_scotland
STEP Conference 2015 - Alex Macaulay, SEStran - The role of Regional Transpor...STEP Conference 2015 - Alex Macaulay, SEStran - The role of Regional Transpor...
STEP Conference 2015 - Alex Macaulay, SEStran - The role of Regional Transpor...
STEP_scotland409 vues
Filming risk assessment par ctkmedia
Filming risk assessmentFilming risk assessment
Filming risk assessment
ctkmedia506 vues
1.website & team_profiles_guidance (1) par ctkmedia
1.website & team_profiles_guidance (1)1.website & team_profiles_guidance (1)
1.website & team_profiles_guidance (1)
ctkmedia1.3K vues
Global Competitiveness Report 2016 par Amit Anand
Global Competitiveness Report 2016Global Competitiveness Report 2016
Global Competitiveness Report 2016
Amit Anand177 vues
Transparancy International Hungary kft - Kommunikációs Elemzés par Krisztina Ilosfai
Transparancy International Hungary kft - Kommunikációs ElemzésTransparancy International Hungary kft - Kommunikációs Elemzés
Transparancy International Hungary kft - Kommunikációs Elemzés
Les capacitats físiques bàsiques par Pacolg85
Les capacitats físiques bàsiquesLes capacitats físiques bàsiques
Les capacitats físiques bàsiques
Pacolg85379 vues
The Data School Meet & Greet par Andy Kriebel
The Data School Meet & GreetThe Data School Meet & Greet
The Data School Meet & Greet
Andy Kriebel1.7K vues
Health problems in umbai par aziz khan
Health problems in umbaiHealth problems in umbai
Health problems in umbai
aziz khan1.4K vues
Delhi Metro Railway's Stakeholder Management par SIDDHARTH SWAIN
Delhi Metro Railway's Stakeholder Management Delhi Metro Railway's Stakeholder Management
Delhi Metro Railway's Stakeholder Management
SIDDHARTH SWAIN3.1K vues
Jeff Simpson - Cyber Maneuver Warfare and Active Cyber Defense - from ICCWS 16 par Jeff Simpson
Jeff Simpson - Cyber Maneuver Warfare and Active Cyber Defense - from ICCWS 16 Jeff Simpson - Cyber Maneuver Warfare and Active Cyber Defense - from ICCWS 16
Jeff Simpson - Cyber Maneuver Warfare and Active Cyber Defense - from ICCWS 16
Jeff Simpson715 vues

Similaire à Cyber Security, Cyber Warfare

Securing Indian Cyberspace Shojan par
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanShojan Jacob
984 vues31 diapositives
Is Cyber-offence the New Cyber-defence? par
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Jim Geovedi
6.7K vues35 diapositives
Stuxnet, a malicious computer worm par
Stuxnet, a malicious computer wormStuxnet, a malicious computer worm
Stuxnet, a malicious computer wormSumaiya Ismail
137 vues11 diapositives
Cyber security , an Analysis of State Security in Sri Lanka par
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaEvan Pathiratne
2.5K vues18 diapositives
Cyberware par
CyberwareCyberware
CyberwareEnsar Seker
205 vues25 diapositives
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber... par
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...Boston Global Forum
279 vues11 diapositives

Similaire à Cyber Security, Cyber Warfare(20)

Securing Indian Cyberspace Shojan par Shojan Jacob
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace Shojan
Shojan Jacob984 vues
Is Cyber-offence the New Cyber-defence? par Jim Geovedi
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?
Jim Geovedi6.7K vues
Stuxnet, a malicious computer worm par Sumaiya Ismail
Stuxnet, a malicious computer wormStuxnet, a malicious computer worm
Stuxnet, a malicious computer worm
Sumaiya Ismail137 vues
Cyber security , an Analysis of State Security in Sri Lanka par Evan Pathiratne
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri Lanka
Evan Pathiratne2.5K vues
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber... par Boston Global Forum
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
Cyber warfare ss par Maira Asif
Cyber warfare ssCyber warfare ss
Cyber warfare ss
Maira Asif1.2K vues
Cyberwar and Geopolitics par tnwac
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopolitics
tnwac161 vues
Cybersecurity Law and Policy II Slides for First Summit Meeting par David Opderbeck
Cybersecurity Law and Policy II Slides for First Summit MeetingCybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit Meeting
David Opderbeck131 vues
2019 11 terp_breuer_disclosure_master par bodaceacat
2019 11 terp_breuer_disclosure_master2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master
bodaceacat80 vues
Changing Domains - The Cyber Info Realm 2023.pdf par Benjamin Ang
Changing Domains - The Cyber Info Realm 2023.pdfChanging Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdf
Benjamin Ang4 vues
ID IGF 2016 - Hukum 3 - Kedaulatan dan Ketahanan Cyber Nasional par IGF Indonesia
ID IGF 2016 - Hukum 3 - Kedaulatan dan Ketahanan Cyber NasionalID IGF 2016 - Hukum 3 - Kedaulatan dan Ketahanan Cyber Nasional
ID IGF 2016 - Hukum 3 - Kedaulatan dan Ketahanan Cyber Nasional
IGF Indonesia664 vues
A US Cybersecurity Strategy for 2030 par Scott Dickson
A US Cybersecurity Strategy for 2030A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030
Scott Dickson381 vues

Plus de Amit Anand

Draft National Education Policy, 2016 par
Draft National Education Policy, 2016Draft National Education Policy, 2016
Draft National Education Policy, 2016Amit Anand
1.8K vues4 diapositives
Higher Education In India par
Higher Education In IndiaHigher Education In India
Higher Education In IndiaAmit Anand
862 vues4 diapositives
World Development Report 2016 - Digital dividends par
World Development Report 2016 - Digital dividendsWorld Development Report 2016 - Digital dividends
World Development Report 2016 - Digital dividendsAmit Anand
161 vues4 diapositives
Air Transport India par
Air Transport IndiaAir Transport India
Air Transport IndiaAmit Anand
461 vues3 diapositives
Effects of Globalisation on Indian Society par
Effects of Globalisation on Indian Society Effects of Globalisation on Indian Society
Effects of Globalisation on Indian Society Amit Anand
8.4K vues6 diapositives
Human Right Violation of Homosexuals par
Human Right Violation of HomosexualsHuman Right Violation of Homosexuals
Human Right Violation of HomosexualsAmit Anand
1.2K vues8 diapositives

Plus de Amit Anand(6)

Draft National Education Policy, 2016 par Amit Anand
Draft National Education Policy, 2016Draft National Education Policy, 2016
Draft National Education Policy, 2016
Amit Anand1.8K vues
Higher Education In India par Amit Anand
Higher Education In IndiaHigher Education In India
Higher Education In India
Amit Anand862 vues
World Development Report 2016 - Digital dividends par Amit Anand
World Development Report 2016 - Digital dividendsWorld Development Report 2016 - Digital dividends
World Development Report 2016 - Digital dividends
Amit Anand161 vues
Air Transport India par Amit Anand
Air Transport IndiaAir Transport India
Air Transport India
Amit Anand461 vues
Effects of Globalisation on Indian Society par Amit Anand
Effects of Globalisation on Indian Society Effects of Globalisation on Indian Society
Effects of Globalisation on Indian Society
Amit Anand8.4K vues
Human Right Violation of Homosexuals par Amit Anand
Human Right Violation of HomosexualsHuman Right Violation of Homosexuals
Human Right Violation of Homosexuals
Amit Anand1.2K vues

Dernier

2022 CAPE Merit List 2023 par
2022 CAPE Merit List 2023 2022 CAPE Merit List 2023
2022 CAPE Merit List 2023 Caribbean Examinations Council
5K vues76 diapositives
The Accursed House by Émile Gaboriau par
The Accursed House  by Émile GaboriauThe Accursed House  by Émile Gaboriau
The Accursed House by Émile GaboriauDivyaSheta
201 vues15 diapositives
Gopal Chakraborty Memorial Quiz 2.0 Prelims.pptx par
Gopal Chakraborty Memorial Quiz 2.0 Prelims.pptxGopal Chakraborty Memorial Quiz 2.0 Prelims.pptx
Gopal Chakraborty Memorial Quiz 2.0 Prelims.pptxDebapriya Chakraborty
655 vues81 diapositives
Women from Hackney’s History: Stoke Newington by Sue Doe par
Women from Hackney’s History: Stoke Newington by Sue DoeWomen from Hackney’s History: Stoke Newington by Sue Doe
Women from Hackney’s History: Stoke Newington by Sue DoeHistory of Stoke Newington
150 vues21 diapositives
Community-led Open Access Publishing webinar.pptx par
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxJisc
93 vues9 diapositives
ICS3211_lecture 08_2023.pdf par
ICS3211_lecture 08_2023.pdfICS3211_lecture 08_2023.pdf
ICS3211_lecture 08_2023.pdfVanessa Camilleri
149 vues30 diapositives

Dernier(20)

The Accursed House by Émile Gaboriau par DivyaSheta
The Accursed House  by Émile GaboriauThe Accursed House  by Émile Gaboriau
The Accursed House by Émile Gaboriau
DivyaSheta201 vues
Community-led Open Access Publishing webinar.pptx par Jisc
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptx
Jisc93 vues
The Open Access Community Framework (OACF) 2023 (1).pptx par Jisc
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptx
Jisc110 vues
PLASMA PROTEIN (2).pptx par MEGHANA C
PLASMA PROTEIN (2).pptxPLASMA PROTEIN (2).pptx
PLASMA PROTEIN (2).pptx
MEGHANA C68 vues
AI Tools for Business and Startups par Svetlin Nakov
AI Tools for Business and StartupsAI Tools for Business and Startups
AI Tools for Business and Startups
Svetlin Nakov107 vues
11.28.23 Social Capital and Social Exclusion.pptx par mary850239
11.28.23 Social Capital and Social Exclusion.pptx11.28.23 Social Capital and Social Exclusion.pptx
11.28.23 Social Capital and Social Exclusion.pptx
mary850239298 vues
11.30.23 Poverty and Inequality in America.pptx par mary850239
11.30.23 Poverty and Inequality in America.pptx11.30.23 Poverty and Inequality in America.pptx
11.30.23 Poverty and Inequality in America.pptx
mary850239160 vues
Narration ppt.pptx par TARIQ KHAN
Narration  ppt.pptxNarration  ppt.pptx
Narration ppt.pptx
TARIQ KHAN135 vues
When Sex Gets Complicated: Porn, Affairs, & Cybersex par Marlene Maheu
When Sex Gets Complicated: Porn, Affairs, & CybersexWhen Sex Gets Complicated: Porn, Affairs, & Cybersex
When Sex Gets Complicated: Porn, Affairs, & Cybersex
Marlene Maheu67 vues
Drama KS5 Breakdown par WestHatch
Drama KS5 BreakdownDrama KS5 Breakdown
Drama KS5 Breakdown
WestHatch79 vues
Create a Structure in VBNet.pptx par Breach_P
Create a Structure in VBNet.pptxCreate a Structure in VBNet.pptx
Create a Structure in VBNet.pptx
Breach_P75 vues
Class 10 English lesson plans par TARIQ KHAN
Class 10 English  lesson plansClass 10 English  lesson plans
Class 10 English lesson plans
TARIQ KHAN288 vues
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively par PECB
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB 585 vues

Cyber Security, Cyber Warfare

  • 1. Cyber Security Amit Kumar Anand www.amitkanand.com September 21, 2016 1 Cyber Warfare • Attacking the information systems of other countries for espionage and for dis- rupting their critical infrastructure. • Attacks on websites of Estonia in 2007 and Georgia in 2008. 2 Cyber Crime • Use of cyber space for criminal activities. e.g. financial fraud, identity theft, mor- phing etc. • Information Technology Act (IT Act) 2000 confers extra territorial jurisdiction on Indian courts and empowers them to take cognizance of offences committed outside India even by foreign nationals. • Stuxnet targeted nuclear facilities of Iran. 3 Cyber Terrorism • Use of cyber space by terrorists for com- munication, command, and control, pro- paganda, recruitment, training and fund- ing purposes. • ISIS 4 Cyber Espionage • Spying and surveillance over cyber space. • Titan rain - Series of coordinated at- tacks on American computer systems since 2003. China was blamed for this. • Project PRISM. 5 Securing Cyberspace • An effective cyber deterrence strategy will include deterrence by denial as well as penalty by punishment. • Deterrence by denial will rely on strong defences. i.e. the capabilities to bounce back are strong. • Deterrence by punishment relies on the ability to counter-attack. • If the attacker knows retaliation would be “certain, severe and immediate”, it will deter him. • In cyberspace, where anonymity is the key, it is difficult to identify precisely who the attacker is. Non-attribution is the fundamental weakness of the cyber de- terrence argument. 6 India’s steps for securing cyberspace • National Cyber Security Policy 2013. • National Cyber Security Assurance Framework under implementation. • National Cyber Security Coordinator ap- pointed in 2015. • National Critical Information Infrastruc- ture Protection Centre (NCIIPC) set up. • National Cyber Coordination Centre (NCCC) set up. • Regular dialogue between government and private sector. 1
  • 2. • New cyber security curricula introduced in colleges. • Cybersecurity R&D policy under active consideration of government. • Indian Computer Emergency Response Team (CERT-In). 7 Clausewitzian Trinity • Trinity held the key to victory in the war 1. military or means to fight war. 2. people or support for war in terms of manpower and finance. 3. political instrument or government to provide leadership and direction in war. • if these three tendencies are active and interacting a nation can withstand any aggression. • if any of the trinity is completely de- stroyed,the trinity is resilient enough the other two tendencies would revive it back and the trinity will survive. • Today, all three tendencies are exten- sively dependent on information and in- formation assets. • Modern nations are dependent on infor- mation systems from military systems to household essentials. • the three tendencies of the Clausewitzian Trinity are becoming extensively suscep- tible to strategic information warfare. • if all the three tendencies are simultane- ously attacked, or in conventional terms are subjected to parallel warfare in cy- berspace, then it would generate a cas- cade effect, inducing strategic paralysis, and the victim nation would crumble as a system, resulting in chaos and mayhem. • Modern militaries rely extensively on in- formation systems. Command, Control, Communication, Computer, Intelligence, Surveillance, Reconnaissance (C4SIR); Strategic Information Dissemination Sys- tems (SIDS); Net Centric Warfare/ Net- work Enabled Operations (NCW/NEO); Global Positioning System (GPS); Bat- tle Field Surveillance Radar (BFSR), Surveillance satellites, Global Command and Control Systems (GCCS). • These information assets acts as force multiplier but at the same time are sus- ceptible to attack. • Stuxnet, Duqu malware. • Modern societies are dependent on infor- mation infrastructures. • Critical infrastructures of nations are de- pendent on information systems. Power stations on Supervisory Control and Data Acquisition (SCADA) and Distributed Control System (DCS). Air Traffic Con- trol, transportation systems, navigation systems, banking infrastructure, stock exchanges. • Sudden disappearance of information re- source from a information dependent so- ciety in the event of cyber attack would render people in the state of shock. e.g. they cannot contact their near one due to loss of communication systems. • Governments acts as instrument of po- litical direction and play critical role in steering the nation. • Law enforcement agencies depend in criminal databases. • Media is important linkage between gov- ernment and public. • e-governance. • Media networks could be used to spread disinformation. Psychological Opera- tions (PSYOPS) in cyberspace. • Potential further exacerbated with the advent of social media and attack vec- tors such as social bots for manipulation of public opinion. 2
  • 3. • PSYOPS can be used to induce fear, chaos, misconception and division of per- ceptions within a country which could result in political upheavals and mass movements. e.g. Role of Twitter in 2009 upheavals in Iran and Belarus. • These three tendencies of the Trinity form the core of a nation, and hence to destroy a nation, it is important that all the three be destroyed. • Their dependence on the cyberspace makes them a perfect target for strategic warfare in cyberspace. • All the three tendencies of the Trinity should be simultaneously destroyed, as being a resilient system the chances of revival of the Trinity and the failure of the attack to achieve a strategic effect are very high. 8 Fifth Domain of War • The potency of this threat has compelled almost every country to develop capabil- ities in the cyber domain, as is the case for land, air, sea and space. • By the end of 2008 nearly 140 countries possessed varying degrees of cyber attack capabilities. [Spy Ops] • India on its growth path is vulnerable. Located in an unstable region where the larger neighbours possess this capacity, it is logical to assume that the country is under serious threat and constant attack. 3