STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Jan Kallberg, Bhavani Thuraisingham Chapter 19 - From Cyber Terrorism to State Actors’ Covert Cyber Operations,

Slides:



Advertisements
Similar presentations
James D. Brown Chief Engineer and Senior Fellow Information Resource Management L-3 Communications.
Advertisements

The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012.
Elements of Threat - Challenges for Visualisation Barry Horne Visualisation N/X Penn State University 11 March 2003.
Building a Strategy for Combating Terrorism. “We have to fight terrorists as if there were no rules, and preserve our open society as if there were no.
Introduction and Overview of Digital Crime and Digital Terrorism
Copyright © Allyn & Bacon 2010 Global Social Problems: War and Terrorism This multimedia product and its contents are protected under copyright law. The.
CYBER THREATS: IMPLICATIONS FOR NIGERIA’S NATIONAL INTEREST BY MAJOR GENERAL GG UMO OON GSS psc(+) fwc CMH MIMC MNIM RESTRICTED.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
1 Cyber Risk – What can you do…? Chris Clark Managing Director, Prosperity 24.7.
CYBERSPACE A Global War-fighting Domain Every minute of every day, Airmen in the United States Air Force are flying and fighting in cyberspace.
Australia and Cyber Warfare by Ian Dudgeon A presentation to the AIIA Queensland Branch 14 June 2011.
MIT-Harvard Conference Cyber International Relations (ECIR)
DuWayne Aikins Information Security Forum May 21, 2015 Cyber, A Militarized Domain: What is Means to Texas.
Cyber-Warfare: The Future is Now!
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Lachlan MacKinnon, Liz Bacon, Diane Gan, Georgios Loukas, David Chadwick, Dimitrios Frangiskatos Chapter 20.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Submitted by: Abhashree Pradhan CA (1)
17th WATCH: Cyberwar -- Without the Magical Thinking Stewart A. Baker Steptoe & Johnson THURSDAY July 18 th, Noon, Room 110 W ashington A rea T rustworthy.
Jackie Phahlamohlaka Mapule Modise Nthumeni Nengovhela
IAEA International Atomic Energy Agency IAEA Nuclear Security Programme Enhancing cybersecurity in nuclear infrastructure TWG-NPPIC – IAEA May 09 – A.
The role of private security in the protection of critical infrastructures Veerle Pashley Free University of Brussels Department of Criminology.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Paul de Souza Chapter 18 - National Cyber Defense Strategy, Pg. 224.
Chapter 9 Pursuing Security. Causes of War 1.System-Level Causes: wars may be caused by a number of factors related to the general nature of the world’s.
Australia’s National Security Apparatus Ms Vikki Templeman Director Strategic Assessments and Long Range Planning.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Fahimeh Tabatabaei, Reza Naserzadeh, Simeon Yates, Babak Akhgar, Eleanor Lockley, David Fortune Chapter 8.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
How does Singapore manage conflict and ensure national security?
Enterprise Risk Management Chapter One Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
WebCast 5 May 2003 Proposed NERC Cyber Security Standard Presentation to IT Standing Committee Stuart Brindley, IMO May 26, 2003.
Information Warfare Summary. Information Security Information Assurance Information Warfare Information Dominance.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Babak Akhgar, Simeon Yates & Eleanor Lockley Chapter 1 - Strategy Formation in a Globalized and Networked.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Threat context TLP WHITE Cyber security panel
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Andrew Staniforth Chapter 17 - Securing Cyberspace: Strategic Responses for a Digital Age, Pg. 213.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Topic 5: Basic Security.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Andrew Staniforth Chapter 2 - Securing the State: Strategic Responses for an Interdependent World, Pg. 10.
Understanding the Threats of and Defenses Against Cyber Warfare.
Aspen, Colorado September 19 th, 2013 BLACK AND VEATCH UTILITY EXECUTIVE LEADERSHIP INSTITUTE: “PREDICTABLE PERFORMANCE”
The Internet of Things, WTF? Rik Ferguson Vice President, Security Research Trend #CLOUDSEC.
UNCLASSIFIED 1 National Security in Cyberspace: It Takes a Nation Sandra Stanar-Johnson NSA/CSS Representative to the Department of Homeland Security February.
Cyber Security Architecture of Georgia Giorgi Tielidze 0 Current Challenges and Future Perspectives Tbilisi 2015.
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
Homeland Security CJ 355 Unit 6 Professor David R. Thompson.
Security Mindset Lesson Introduction Why is cyber security important?
Smart City Hacked??? Technology & Society. American cities vulnerable to large-scale cyber attack
Homeland Security CJ355 Week 8 Police Tactical Preparation and Citizen’s Role in Homeland Security.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Kristian Krieger, M. Brooke Rogers Chapter 7 - Promoting Public Resilience against Chemical, Biological, Radiological.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Cyber Risks: Protecting confidential data against unauthorized access Vik Bansal Deloitte & Touche LLP John Reidhead State of Utah March 17, 2016.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Proactive Incident Response
Computer Security Incidents
What is Cyber Security Cyber War Cyber Power?
The Economics of Cyber Security
Issues and Protections
Chapter Twenty Global Policy.
COSC 316: Host Computer Security
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Industrial Control Systems Security Market to reach $7bn by 2024: Global.
Cyber-security and IEC International Standards
CRITICAL INFRASTRUCTURE CYBERSECURITY
Computer Security Incidents
Strategic threat assessment
Ch 13. Changing character of war
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
Chapter 1 Key Security Terms.
Presentation transcript:

STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Jan Kallberg, Bhavani Thuraisingham Chapter 19 - From Cyber Terrorism to State Actors’ Covert Cyber Operations, Pg. 229

Section 4: Future Threats and Cyber Security 19. From Cyber Terrorism to State Actors’ Covert Cyber Operations, Pg. 229 Historically, since the Internet started to become a common feature in our lives, hackers have been seen as a major threat. This view has repeatedly been entrenched and distributed by media coverage and commentaries through the years. Instead the first 20 years of the Internet was acceptably secure due to the limited abilities of the attackers, compared to the threat generated from a militarized Internet with state actors conducting cyber operations. In reality, the Internet has a reversed trajectory for its security; it has become more unsafe over time and moved from a threat to the individual to a national security threat. The entry of state actors creates a contested cyberspace where intelligence, economic espionage, information operations, and psychological operations radically changed the fundamentals for Internet security. The state actor seeks to exploit weaknesses in the targeted national infrastructure, industrial base's connection to the global networked grid, and take advantage of the fact that our populations heavily rely on the Internet.

Section 4: Future Threats and Cyber Security 19. From Cyber Terrorism to State Actors’ Covert Cyber Operations, Pg. 229 The aggressive state actor has an advantage in cyberspace due to the weaknesses in attribution, which work as a standing invite to conduct proxy wars, utilizing criminal networks or aligned political groups, to carry out the attacks with little risk for detection. This requires a modified view on cyberspace role in national security. The threat from cyber operations will increase in the next decade, even if we have implemented extensive information security. The Internet and the application layer become a globally contested domain where the entrance of state actors as contestants and aggressors create a radical shift. The early hackers and information thieves had limited resources and mainly a financial goal. State-run operations have a complete different set of targets and goals. If states collect vulnerabilities in targeted systems, utilize the whole covert spectrum, and instead of attacking themselves uses terrorist groups as proxies, then cyber terrorism is a tangible and relevant national security threat.

Section 4: Future Threats and Cyber Security 19. From Cyber Terrorism to State Actors’ Covert Cyber Operations, Pg. 229 The digital environment where critical assets can be copied, sent, and forwarded within seconds, ushers in a symbiosis between aggressive adversarial state actors and terrorist networks when the state actor can produce military-grade cyber weapons for the terrorists to use. Waltz (1990) argued that the power embedded in nuclear arms is not what you do but what you can do. The outsourced proxy cyber war from state actor to cyber terrorists operates along the same lines as military-grade cyber weapons dispersed to violent groups and militant political groups create extensive uncertainty. This uncertainty is based on what an aggressor can do— not what they actually do. This development creates an asymmetric covert conflict with an anonymous aggressor and a reactive targeted society. Terrorists can reach their objectives, create damage, influence policy, and leverage the disproportional power relation between terrorists and the defending state.