Posted: April 9th, 2024
Cyber Warfare INTL440 Week 1 – Department of Defense Strategy for Operating in Cyberspace
Cyber Warfare
INTL440
Week 1
Terminology
⢠Cyberspace
⢠Network
⢠Internet
⢠Cyber
Warfare
Threats
⢠Governments
⢠Hacktivists
⢠Criminals
⢠Terrorists
What is cyberspace?
According to The National Military Strategy for Cyberspace
Operations, (1) cyberspace is:
âA domain characterized by the use of electronics and the
electromagnetic spectrum to store, modify, and exchange data via networked
systems and associated physical infrastructures.â
From the Department of Defense Strategy for Operating in
Cyberspace:
âThe security and effective operation of U.S. critical infrastructure â including
energy, banking and finance, transportation, communication, and the Defense
Industrial Base â rely on cyberspace, industrial control systems, and
information technology that may be vulnerable to disruption or exploitation.â
(2)
Cyberspace is about networks
What is a network?
A network consists
of two or more computers connected so that they can exchange data and share
resources.
A Peer to Peer Network:The simplest network consists of two
computers directly connected so that they can share files.
The Local Area Network (LAN)
The next step is a LAN, familiar in most offices and many
homes.
LANs allow sharing of both files and devices. They may span several offices or a building.
Connecting networks
Wide Area Networks
(WAN)
www.agatefroce.com
In this example, the cloud symbol is used to represent the
routers and paths in cyberspace between the two networks.
WANs permit sharing of resources across a wide geographic
area. Examples include financial
networks, power grid controls, and military networks sharing a common tactical
picture.
WAN communications may traverse any combination of private
links, leased lines, or public Internet connections.
The beginning
The Internet
Sponsored by DODâs
Advanced Research Projects Agency (ARPA), it began in 1969
as an effort to develop a redundant and survivable strategic communications
architecture. Its reliable network
protocol became known as TCP/IP (forTransmission Control Protocol/Internet
Protocol).
Originally known as
Arpanet, this network began as a connection between main frame computers at
several large universities. Over the
next decade, more universities and several government labs were added. Developed in an atmosphere of open
collegiality, the original version included
few security features.
Today
What is cyber warfare?
Researcher Dr. Ivan Goldberg defines Cyber Warfare and
Information Warfare together as
â…the offensive
and defensive use of information and
information systems to deny, exploit, corrupt, or destroy, an adversary’s information,
information-based processes,
information systems, and computer-based networks while protecting one’s own. Such actions are
designed to achieve advantages over
military or business adversaries.â (3)
http://www.defense.gov/news/d20110714cyber.pdf
Richard Clarkeâs definition
in his book Cyber War (HarperCollins 2010):
âactions by a nation-state
to penetrate another nation’s computers or networks for the
purposes of causing damage or
disruption.”
The Threat
From The Joint Operating Environment 2010 (4)
â …With very little investment, and cloaked in a veil of
anonymity, our adversaries will inevitably attempt to harm our national
interests. Cyberspace will become a main front in both irregular and
traditional conflicts. Enemies in cyberspace will include both states and
non-states and will range from the unsophisticated amateur to highly trained
professional hackers. â¦â
Who are the attackers?
Hackers – Strictly speaking, a hacker is anyone who attempts
unauthorized access to a computer or network.
A. White
Hat. A term used to describe
professionals hired to identify security flaws via authorized network
penetration tests.
B. Black
Hat. Refers to hackers attempting
unauthorized access, generally with malicious intent. Sometimes called
âcrackersâ to distinguish them from white hat hackers, they generally fall into one of the following
groups:
(1) Those
engaged in espionage, sabotage or other crimes.
(2) Those
attempting to make a political statement.
(3) Youthful
experimenters hoping to gain bragging rights.
Annual conferences like DEFCON discuss security issues and
identified weaknesses. They attract a wide audience ranging from industry and
government professionals to those whose interests may be questionable…
Young hackers playing with attack scripts are sometimes
derisively referred to as âscript kiddiesâ.
Who employs hackers?
⢠Governments
⢠Hacktivists
⢠Criminals
⢠Terrorists
Governments: Several governments have publicly announced
cyber war units as
Hacktivists
Hacker + Activist = Hacktivist
Hacktivists use cyber attacks to convey a political or
social message. Common tactics include
web site defacement (left) and denial of service attacks in which simultaneous
requests from thousands of PCs block access to the site.
Criminals
Cyber criminals
run the gamut from youths running 419 scams out of Nigerian cyber cafes to
large criminal syndicates.
Organized cyber crime may be involved in:
⢠Fraud ⢠Spamming
⢠Identity theft info for saleâ¢
Gambling
⢠Identity
Theft ⢠Bot nets for hire ⢠Use of proxy servers allows
⢠Illicit
Web Sites ⢠Deniability ⢠Pornography
⢠What may
be state sponsored cyber attacks to be blamed on âcyber hooligansâ
Terrorists
Attacks
So far, there have been no confirmed terrorist cyber attacks. However, a successful attack against a key
financial or infrastructure network could gain them significant publicity for
their cause at relatively little cost.
References:
1. JCS (Dec. 2006) âThe National Military Strategy for
Cyberspace OperationsâAvailable in pdf format from
http://www.carlisle.army.mil/DIME/documents/National%20Military%20Strategy%20for%20Cyberspace%20Operations.pdf
2. DoD (Jul. 2011) âDepartment of Defense Strategy for
Operating in CyberspaceâAvailable in pdf format from http://www.defense.gov/news/d20110714cyber.pdf
3. Goldberg (2010) âGlossary of Information Warfare
Termsâfrom http://www.psycom.net/iwar.2.html
4. Joint Forces Command (2010) âThe Joint Operating
Environment 2010âAvailable in pdf format from http://www.jfcom.mil/newslink/storyarchive/2010/JOE_2010_o.pdf
5. “China Confirms Existence of Elite Cyber-Warfare
Outfit ‘The Blue Army,'” Fox News, May 26, 2011,
http://www.foxnews.com/scitech/2011/05/26/china-confirms-existence-blue-army-elite-cyber-warfare-outfit/
Order | Check Discount
Tags:
Ace My Homework: Essay Help,
Assignment Help: USA's #1 Online Assignment Writing Service,
Do My Assignment for Me Online - Write Academic Papers,
Reliable Online Homework Help For You,
UK Homework Study Bay: Assignment Homework Help & Homework Answers,
Write My Assignments AU - Online Assignment Maker - Writing Services
Sample Essays, Assignments & Research Topics Ideas