Cyberdeterrence, and Cyberwar
|
|
- Emma Jordan
- 7 years ago
- Views:
Transcription
1 Cyberdeterrence, and Cyberwar
2 Prologue In the 1950s, defense against nuclear weapons was next to impossible Hence deterrence theory and its accoutrements Second-strike Extended deterrence Counterforce v. countervalue Today cyberwar appears to be a salient threat With everything being digitized, dedicated hackers could bring everything to a halt in theory Cyberdefense is expensive and leaky So why not protect this country against the new threat by threatening retaliation, as we did for the nuclear threat? A /2010
3 Purpose Discuss cyberdeterrence and whether it makes sense That is, about decisions made by states not colonels Is offense the best defense? Is directed against states (especially if responding in kind) Tease out some of the salient characteristics of cyberwar -- which may result from: The failure of deterrence to forestall attack Escalation of tit-for-tat carried out in the name of deterrence Examine some dynamics of cyber-escalation Akin, in some ways to intra-war deterrence A /2010
4 What Cyberwar Is A /2010
5 What Cyberwar Is The use of information (messages) A /2010
6 What Cyberwar Is The use of information (messages) to harm target information systems A /2010
7 What Cyberwar Is The use of information (messages) to harm target information systems making them fail A /2010
8 What Cyberwar Is The use of information (messages) to harm target information systems or corrupting their contents making them fail A /2010
9 What Cyberwar Is The use of information (messages) to harm target information systems or corrupting their contents making them fail Information attacking information by attacking information systems A /2010
10 What Cyberwar Is t Cyber-espionage (despite similar methods) Far different treatment by international norms Electronic warfare (despite similar modalities) Directed energy (microwave) attacks on systems Psychological operations (even though cyberwar may produce strong psychological effects) Web site whack-a-mole And it goes well beyond flooding/ddos attacks Which only affect public-facing web sites And which many firms can offer protection against A /2010
11 What Cyberwar Cannot Usually Do Create direct permanent effect (usually) It does not break anything directly Systems can usually be restored What about Stuxnet? Preceded by 2007 Aurora experiment Iranians had little experience with normal operations Their devices have no stand-off safety guards or monitoring capablity Be used repeatably Cyberspace is made by its defenders Hackers can only follow paths that already exist Attacks expose holes, which can get patched Which is why Stuxnet I does not imply Stuxnet II The bag of tricks is depletable A /2010
12 Counterforce/Pre-emption Does t Apply in Cyberspace Because command-and-control can be simultaneously hosted in redundant servers, killing any one server may be pointless Of the prerequisites to cyber-attacks a computer, a network connection, hackers, know-how, intelligence only computers can (conceivably) be destroyed by a cyberattack Although defenders need to understand cyber-attacks quickly to minimize or reverse their damage, striking back quickly usually confers little protection A /2010
13 Outline Cyberwar and cyberdeterrence issues A cyberdeterrence decision cycle Controlling Cyber-escalation Conclusions A /2010
14 Generally Cyberattacks Have Two Motives Coercion To demonstrate capability and will But two caveats: It may induce more anger than fear It may escalate a local conflict into a strategic one Pre-emption If a physical attack is going to follow, it must come quickly Unless it is a feint or a test A /2010
15 Attribution Is Imperative Good attribution supports retaliation in three ways Avoids punishing the innocent Makes the case to the rest of the world (and potential attackers) Links action to reaction (retaliation) in the minds of attackers Proof beyond a shadow of a doubt is unnecessary What the accused state did is less important than what it can prevent (hackers need not work for states) but since cyberattacks rarely kill anyone, thresholds for punishment must be developed, communicated, and measured believably A /2010
16 But Attribution Is Hard Cyberattack Lacks obviousness of kinetic attack Leaves no physical evidence (e.g. DNA) States rarely suffer from being linked to a cyberattack (but would take more pains to hide if they did) Finding the machine does not show who did it could come from anywhere Attacker might be known.. If he boasts about it (e.g., to coerce) If he uses a known modus operandi If he makes a mistake Through human intelligence, video, etc. But will this happen often enough to be a basis for deterrence policy? A /2010
17 Predicting Battle Damage Is Also Hard Prediction timeframe Far in advance In the near term All the time Prediction difficult because: Systems change with every software update What can be observed about systems may say little about how the respond to attack: May have war reserve modes May have processes that kick in only when systems go awry Damage roughly proportional to downtime or persistence of corruption, but even system administrators don t know how fast they can reverse effects A /2010
18 Predicting Battle Damage Is Also Hard Prediction timeframe Far in advance In the near term All the time Prediction difficult because: Systems change with every software update What can be observed about systems may say little about how the respond to attack: May have war reserve modes May have processes that kick in only when systems go awry Damage roughly proportional to downtime or persistence of corruption, but even system administrators don t know how fast they can reverse effects A /2010
19 Predicting Battle Damage Is Also Hard Prediction timeframe Far in advance In the near term All the time Prediction difficult because: Systems change with every software update What can be observed about systems may say little about how they respond to attack: May have crisis reserve modes May have processes that kick in only when systems threaten to go awry Damage roughly proportional to downtime or persistence of corruption, but even system administrators don t know how fast they can reverse effects A /2010
20 Predicting Battle Damage Is Also Hard Prediction timeframe Far in advance In the near term All the time Prediction difficult because: Systems change with every software update What can be observed about systems may say little about how they respond to attack: May have crisis reserve modes May have processes that kick in only when systems threaten to go awry Damage roughly proportional to downtime or persistence of corruption, but even system administrators don t know how fast they can reverse effects A /2010
21 Cyberwar May Be Hard to Control Escalation into violence is always a risk A tit-for-tat may activate third-party hackers Cyberwar termination how do we know they stopped? is very difficult because of the attribution problem, particularly if third-party hackers are activated yet, to complain of being attacked in cyberspace is tantamount to admitting that you have been conned, something states may be reluctant to publicize, hence respond to A /2010
22 Outline Cyberwar and cyberdeterrence issues A cyberdeterrence decision cycle Controlling Cyber-escalation Conclusions A /2010
23 What Would a Decision Tree Look Like? Something s happening A /2010
24 First Determine What Something s happening The result of hacking? A /2010
25 Then Try to Figure Out Whether War or Crime Something s happening The result of hacking? Would a state do this? A /2010
26 Then Try to Figure Out Whether War or Crime Something s happening The result of hacking? Would a state do this? But call the FBI A /2010
27 Make Your Best Guess on Who Did It Something s happening The result of hacking? Would a state do this? Attack can be attributed? A /2010
28 Weigh Public Reaction Something s happening The result of hacking? Would a state do this? Attack can be attributed? Effects obvious to public? Maybe retaliate sub rosa A /2010
29 and Public Relations Something s happening The result of hacking? Would a state do this? Attack can be attributed? Effects obvious to public? Maybe retaliate sub rosa or tell the public A /2010
30 ...and Whether You Go Public with What you Know Something s happening The result of hacking? Would a state do this? Attack can be attributed? Effects obvious to public? Can target make attribution public? Maybe retaliate sub rosa Maybe retaliate sub rosa A /2010
31 Determine Whether You Can Retaliate Something s happening The result of hacking? Would a state do this? Attack can be attributed? Effects obvious to public? Can target make attribution public? Have a way to retaliate? Maybe retaliate sub rosa Maybe retaliate sub rosa A /2010
32 and Whether Retaliation Is Worth It Something s happening The result of hacking? Would a state do this? Attack can be attributed? Effects obvious to public? Can target make attribution public? Have a way to retaliate? Maybe retaliate sub rosa Maybe retaliate sub rosa Retaliation do more good than harm? A /2010
33 Contemplate the Pressures on Target of Retaliation Something s happening The result of hacking? Would a state do this? Attack can be attributed? Effects obvious to public? Can target make attribution public? Have a way to retaliate? Maybe retaliate sub rosa Maybe retaliate sub rosa Retaliation do more good than harm? Can attacker allay its public ire enough to counter-retaliate? Maybe retaliate sub rosa A /2010
34 and Hope for the Best Something s happening The result of hacking? Would a state do this? Attack can be attributed? Effects obvious to public? Can target make attribution public? Have a way to retaliate? Maybe retaliate sub rosa Maybe retaliate sub rosa Retaliation do more good than harm? Can attacker allay its public ire enough to counter-retaliate? YES Maybe retaliate sub rosa So, the target state hits back and that settles things or not
35 Outline Cyberwar and cyberdeterrence issues A cyberdeterrence decision cycle Controlling Cyber-escalation Conclusions A /2010
36 Fundamental Features of Escalation Control Attribution is often uncertain Attackers can be combatant states or third party states, nonstate actors, criminal organizations, or individuals So is predicting or even assessing battle damage Overall, because Intentions are poor predictors of actual effects and Perceptions may not match actual effects Perceptions can be two stages removed from intentions But perceptions are what breed pressure to respond Escalation in cyberspace looks different if Cyber operations are carried out against military targets Cyber operations go beyond targets for kinetic attack, or Cyber operations take place in what is otherwise peacetime A /2010
37 Escalation in Cyberspace Beyond Kinetic War Can Follow Many Paths Escalation that Raises Regime Security Issues Anti- Great Firewall Surveillance Systems Police Systems Escalation From Military to Dual-Use to Civilian Attacks on States to Attacks on their Allies Dual-use Facilities Critical Infrastructure In-theater systems of great power friends Health/safety systems All military systems of great power friends To Strategic Systems Out of theater Homeland based Strategic systems A /2010
38 Trying to Escalate is not the Same as Succeeding Others will see only (what they perceive as) effects and not the effort There is no way to tell how many man-years are being thrown at a task or whether anything is being kept in reserve (cf., U.S. escalation in Vietnam measured in troop deployments) There are also few good reasons not to allocate at the outset all cyberwarriors (already on the payroll) to a specific conflict The intent to escalate may not match the actual degree of escalation much less the perceived degree of escalation Kinetic Escalation Options/Outcomes Cyber Escalation Options/Outcomes Don t thing happens Don t thing happens Something is perceived to happen Do thing much happens (rare) Something happens Do thing happens; invisible failure thing happens; visible failure Something happens A /2010
39 But Escalation Can Also Be Accidental or Inadvertent Them Attacks that Imperil Safety Attacks on Civilian Infrastructure Attacks on Military Support They hack the FAA They hack one of our coal-fired power plants They hack Guam s port We hack into their 911 systems. We hack their hydropower dam We hack a civilian port in their country We hack their afloat naval supply facility Attacks on Personal Safety Attacks on Industrial Safety Attacks on the Homeland Attacks in the Field US Or maybe the induced malfunction in the naval supply facility broke the port management software. Unintended escalation is a greater risk when combatants fail to communicate thresholds or define them differently A /2010
40 Adversaries Can Interpret U.S. Escalation Decisions in Many Ways If we escalate in cyberspace, they might conclude, alternatively: We can escalate (if our attacks succeed and impress) We are willing to take risks but not casualties We believe cyberattacks on non-military targets are legitimate We know they have escalated and would risk mutual escalation to get them to stop (if they thought we were responding to their escalation) We are trigger-happy even though our detection mechanisms are weak (if they thought we were responding to something that did not occur or was not their fault) If we do not escalate or even respond, they might conclude: We do not have the capability to escalate We do not know it was they who attacked us or even whether the effects were those intended We do know but are showing restraint A /2010
41 Threatening Escalation to Control Escalation is Tricky Our threat to escalate may inhibit their escalation or make them stop, but only if They believe we have the means They believe we have the will (even in the face of potential counterresponse) Their escalation has no compelling military rationale They do not fear losing too much face by complying They feel that our declared red lines are well-defined, straightforward to monitor and fair (v. one-sided, arbitrary, unfounded in customary law, or self-serving), and They believe that if they do not cross the line neither will we A /2010
42 Outline Cyberwar and cyberdeterrence issues A cyberdeterrence decision cycle Controlling Cyber-escalation Conclusions A /2010
43 Conclusions Cyberwar is not just war carried on in another dimension (same for cyberdeterrence) In many cases, key questions are different In other cases, key answers are different Although cyberwar may share some facets of other types of warfare (e.g., electronic, terrorism), it merits consideration from first principles Compared to retaliation, defense, although expensive, is less problematic and risky Even if we do not forswear retaliation as a policy, we should think carefully before embracing it A /2010
44
STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;
STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; LIEUTENANT GENERAL JAMES K. MCLAUGHLIN DEPUTY COMMANDER,
More informationA Community Position paper on. Law of CyberWar. Paul Shaw. 12 October 2013. Author note
A Community Position paper on Law of CyberWar Paul Shaw 12 October 2013 Author note This law and cyberwar paper / quasi-treatise was originally written for a course in a CISO certification curriculum,
More informationDoes NATO s Article V Genuinely Protect Its Members?
Does NATO s Article V Genuinely Protect Its Members? NATO has been the most successful alliance of history. We repeat this truth quite frequently, especially now that we celebrate 60 years of its successful
More informationCybersecurity & International Relations. Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey.
Cybersecurity & International Relations Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey. Cybersecurity & IR This part of the IWOSI aims to link the Information
More informationCHAPTER 13: International Law, Norms, and Human Rights
CHAPTER 13: International Law, Norms, and Human Rights MULTIPLE CHOICE 1. Why did the former Secretary General of the United Nations, Kofi Annan, state that the US invasion of Iraq in 2003 was illegal?
More information10 Hidden IT Risks That Might Threaten Your Law Firm
(Plus 1 Fast Way to Find Them) Your law firm depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine
More informationNATO & Cyber Conflict: Background & Challenges
NATO & Cyber Conflict: Background & Challenges Dr. Sean Lawson Department of Communication University of Utah [Full citation: Lawson, Sean. (2012) NATO & Cyber Conflict: Background & Challenges. Presented
More informationAppendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking
Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing
More informationBoston University Security Awareness. What you need to know to keep information safe and secure
What you need to know to keep information safe and secure Introduction Welcome to Boston University s Security Awareness training. Depending on your reading speed, this presentation will take approximately
More information"Cyber War or Electronic Espionage - Active Defense or Hack Back" David Willson Attorney at Law, CISSP Assess & Protect Corporate Information
"Cyber War or Electronic Espionage - Active Defense or Hack Back" David Willson Attorney at Law, CISSP Assess & Protect Corporate Information Iran Georgia France Estonia Attacks on Nations UK Belgium South
More informationThe Korean Cyber Attacks and Their Implications for Cyber Conflict James A. Lewis Center for Strategic and International Studies October 2009
The Korean Cyber Attacks and Their Implications for Cyber Conflict James A. Lewis Center for Strategic and International Studies October 2009 It has been several months since the basic denial of service
More informationAppendix 2 Deterrence as a security concept against cyber threats
Appendix 2 Deterrence as a security concept against cyber threats Sico van der Meer Current situation Cyber threats, also referred to as digital threats, are among the greatest threats currently facing
More informationCyber Security and Infrastructure: Problems of Today, Challenges for Tomorrow
Cyber Security and Infrastructure: Problems of Today, Challenges for Tomorrow Herb Lin Computer Science and Telecommunications Board NAE Convocation of Engineering Professional Societies Washington DC
More informationThe Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.
The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be
More informationFBI AND CYBER SECURITY
FBI AND CYBER SECURITY SSA John Caruthers SSA Ken Schmutz SSA Tom Winterhalter Mission The FBI is the only U.S. agency charged with the authority to investigate both criminal and national security investigations.
More informationAdvanced & Persistent Threat Analysis - I
Advanced & Persistent Threat Analysis - I Burak Ekici ekcburak@hotmail.com Department of Computer Engineering, Yaşar University, Turkey. April 21, 2012 Burak Ekici (Dept. of Comp. Eng.) Advanced & Persistent
More informationOur Code is for all of us
This is Our Code This is Our Code Our Code How we behave forms the character of our company and dictates how others see us. How we conduct ourselves determines if people want to do business with us, work
More informationHearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission
Hearing before the House Permanent Select Committee on Intelligence Homeland Security and Intelligence: Next Steps in Evolving the Mission 18 January 2012 American expectations of how their government
More informationThe main object of my research is :
The main object of my research is : «War» I try to analyse the mutual impacts between «new wars» and the evolution of the international system More especially my research is about what we call»cyber-war«or»cyber-conflicts«is
More informationUN Emergency Summit on Cyber Security Topic Abstract
UN Emergency Summit on Cyber Security Topic Abstract Dear Delegates and Moderators, Welcome to the UN Emergency Summit on Cyber Security! Cyber security is one of the most relevant issues in the international
More informationMANAGING DIFFICULT BEHAVIOUR
MANAGING DIFFICULT BEHAVIOUR All materials Lindsay Wright. This pack for sample purposes only and not for re-use. 1 WHAT IS CONFLICT Conflict can be defined as a difference in view between stakeholders;
More informationCyber Terrorism and Australia s Terrorism Insurance Scheme. Physically Destructive Cyber Terrorism as a Gap in Current Insurance Coverage
Cyber Terrorism and Australia s Terrorism Insurance Scheme Physically Destructive Cyber Terrorism as a Gap in Current Insurance Coverage Cyber Terrorism? 2013 cyber attacks on the websites of media companies
More informationV: RECOMMENDATIONS TERRORIST ATTACKS ON U.S. FACILITIES IN BENGHAZI
V: RECOMMENDATIONS TERRORIST ATTACKS ON U.S. FACILITIES IN BENGHAZI Recommendation: The Executive Branch should provide for a central planning and coordination mechanism (likely within an existing entity)
More informationReligious Studies (Short Course) Revision Religion, War and Peace
Religious Studies (Short Course) Revision Religion, War and Peace How to use this presentation The first part of this presentation (blue headings) will give you brief information, religious viewpoints
More informationRecent cyber-security studies in the U.S. David D. Clark MIT CFP May, 2009
Recent cyber-security studies in the U.S. David D. Clark MIT CFP May, 2009 Two recent studies National Academies Study: Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack
More informationObstacles for Security Cooperation in North America. Roberto Domínguez 2012-2013 Jean Monnet/GGP Fellow
Obstacles for Security Cooperation in North America Roberto Domínguez 2012-2013 Jean Monnet/GGP Fellow What is North America? IR literature: United States and Canada After NAFTA: US, Canada, Mexico Over-theorization
More informationToday s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns
Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns Benjamin GITTINS Ronald KELSON What is cyberspace and why is it so important? US Government Cyberspace
More informationNetwork Security Landscape
Cole p01.tex V3-07/28/2009 3:46pm Page 1 Network Security Landscape COPYRIGHTED MATERIAL IN THIS PART Chapter 1 State of Network Security Chapter 2 New Approaches to Cyber Security Chapter 3 Interfacing
More informationTHE CURRENT GLOBAL THREATS TO CYBERSPACE SECURITY
前 沿 探 索 THE CURRENT GLOBAL THREATS TO CYBERSPACE SECURITY By Lt Col Jose Luis Llagran Bonilla 1 (Ecuador) I. Introduction Cyberspace is an interdependent network of information technology infrastructures
More informationMarketing strategy questionnaire
Marketing strategy questionnaire Prepared by: Date: Purpose Use this template to capture the key information that you need to develop a thorough marketing strategy. Then use the information that you collect,
More informationIt's a MAD, MAD, MAD Cyber World
It's a MAD, MAD, MAD Cyber World Remarks by Rod Beckstrom at the Personal Democracy Forum New York City June 6, 2013 As prepared for delivery EMBARGOED FOR RELEASE AT 16.00 EST, 06 JUNE 2013 Let s start
More informationworking group on foreign policy and grand strategy
A GRAND STRATEGY ESSAY Managing the Cyber Security Threat by Abraham Sofaer Working Group on Foreign Policy and Grand Strategy www.hoover.org/taskforces/foreign-policy Cyber insecurity is now well established
More informationOption 1: Use the Might of the U.S. Military to End the Assad Regime
1 Option 1: Use the Might of the U.S. Military to End the Assad Regime The Syrian dictatorship s use of chemical weapons against its own people was terrible. But we must not let it overshadow the larger
More informationFlexible, Life-Cycle Support for Unique Mission Requirements
Flexible, Life-Cycle Support for Unique Mission Requirements We Meet the Need Anytime, Anywhere, Any Mission The customers we serve are diverse and so are their requirements. Transformational logistics
More informationCyberbullyNOT Student Guide to Cyberbullying
CyberbullyNOT Student Guide to Cyberbullying WHAT IS CYBERBULLYING? Cyberbullies use the Internet or cell phones to send hurtful messages or post information to damage people s reputation and friendships.
More informationHow To Write A National Cybersecurity Act
ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses
More informationVocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights
A. Content Vocabulary Directions: Fill in the Crossword Puzzle with content vocabulary words from Chapter 4. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 19 20 18 1 A. Content Vocabulary, Cont. Across 5.
More informationA Detailed Strategy for Managing Corporation Cyber War Security
A Detailed Strategy for Managing Corporation Cyber War Security Walid Al-Ahmad Department of Computer Science, Gulf University for Science & Technology Kuwait alahmed.w@gust.edu.kw ABSTRACT Modern corporations
More informationThe Four-Step Guide to Understanding Cyber Risk
Lifecycle Solutions & Services The Four-Step Guide to Understanding Cyber Risk Identifying Cyber Risks and Addressing the Cyber Security Gap TABLE OF CONTENTS Introduction: A Real Danger It is estimated
More informationCYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES
CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer
More informationFederal Bureau of Investigation
Federal Bureau of Investigation SSA John Caruthers Cyber Criminal Section SSA Kenneth Schmutz Cyber National Security Section April 11, 2012 FBI Mission Cyber Threats FBI Response 1. Protect the United
More informationGlobal Security Academy
Global Security Academy Athena GS3 Security implementation Systems Ltd. 5 Hatzoref St, Holon, 58856, Israel Tel: +972 3 5572462 Fax: +972 3 5572472 www.athenalss.com Message from Chief Executive Officer
More informationSPICE EduGuide EG0015 Security of Administrative Accounts
This SPICE EduGuide applies to HSC information systems, specifically Administrative login accounts; (aka Admin accounts) and the faculty, staff and students who use them. Admin accounts are logon IDs and
More informationRespect Handout. You receive respect when you show others respect regardless of how they treat you.
RESPECT -- THE WILL TO UNDERSTAND Part Two Heading in Decent People, Decent Company: How to Lead with Character at Work and in Life by Robert Turknett and Carolyn Turknett, 2005 Respect Handout Respect
More informationInformation about INTERVENTION ORDERS
Information about INTERVENTION ORDERS This publication has been prepared as a public service initiated by South Australia Police and, while every care has been taken in its preparation, no warranty is
More informationCYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD
CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD The 2011 2015 Cyber Security Strategy of the Czech Republic is linked to the Security Strategy of the Czech Republic and reflects
More informationCyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte
Cyber security Time for a new paradigm Stéphane Hurtaud Partner Information & Technology Risk Deloitte 90 More than ever, cyberspace is a land of opportunity but also a dangerous world. As public and private
More informationGRANGE TECHNOLOGY COLLEGE ANTI-BULLYING POLICY
GRANGE TECHNOLOGY COLLEGE ANTI-BULLYING POLICY Approved: 4 September 2014 Review Date: Page 1 of 7 GRANGE TECHNOLOGY COLLEGE ANTI-BULLYING POLICY Introduction Schools have a duty of care for pupils and
More informationWhitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers
Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to
More informationSentinelOne Labs. Advanced Threat Intelligence Report. 2015 Predictions
SentinelOne Labs Advanced Threat Intelligence Report 2015 Predictions 2014 Rearview More, Better Malware The past 12 months were characterized by the extension of threats that emerged in 2013: more sophisticated,
More informationImage credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.
Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Mike Pryor, 2nd BCT, 82nd Abn. Div. Public Affairs Operations
More informationHow to Justify Your Security Assessment Budget
2BWhite Paper How to Justify Your Security Assessment Budget Building a Business Case For Penetration Testing WHITE PAPER Introduction Penetration testing has been established as a standard security practice
More informationMiddle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
More information10 Hidden IT Risks That Threaten Your Financial Services Firm
Your firm depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine your business without IT. Today,
More informationHow NAS Can Increase Reliability, Uptime & Data Loss Protection: An IT Executive s Story
How NAS Can Increase Reliability, Uptime & Data Loss Protection: An IT Executive s Story How NAS Can Increase Reliability, Uptime & Data Loss Protection: An IT Executive s Story 1 This is Connor, The Small-to-Midsize
More informationWHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.
WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY. A guide for IT security from BIOS The Problem SME s, Enterprises and government agencies are under virtually constant attack today. There
More informationSecurity Goals Services
1 2 Lecture #8 2008 Freedom from danger, risk, etc.; safety. Something that secures or makes safe; protection; defense. Precautions taken to guard against crime, attack, sabotage, espionage, etc. An assurance;
More informationThe Economics of the UK-Iraq Conflict Keith Hartley Centre for Defence Economics University of York
The Economics of the UK-Iraq Conflict Keith Hartley Centre for Defence Economics University of York Introduction: the role of economics Economists are not usually associated with debates about wars. Such
More informationPENETRATION TESTING GUIDE. www.tbgsecurity.com 1
PENETRATION TESTING GUIDE www.tbgsecurity.com 1 Table of Contents What is a... 3 What is the difference between Ethical Hacking and other types of hackers and testing I ve heard about?... 3 How does a
More informationTalking to our children about Violence and Terrorism: Living in Anxious times
Talking to our children about Violence and Terrorism: Living in Anxious times Living in Anxious Times: Introductory Remarks Since the September 11 attack America has changed. Children and adults alike
More informationMoscow subway cars to have CCTV
www.breaking News English.com Ready-to-use ESL / EFL Lessons Moscow subway cars to have CCTV URL: http://www.breakingnewsenglish.com/0507/050719-moscow-e.html Today s contents The Article 2 Warm-ups 3
More informationNATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive
More informationMoscow subway cars to have CCTV
www.breaking News English.com Ready-to-use ESL / EFL Lessons Moscow subway cars to have CCTV URL: http://www.breakingnewsenglish.com/0507/050719-moscow.html Today s contents The Article 2 Warm-ups 3 Before
More informationCYBERSECURITY: ASSESSING THE IMMEDIATE THREAT TO THE UNITED STATES
Statement before the House Oversight and Government Reform Committee, Subcommittee on National Security, Homeland Defense, and Foreign Operations CYBERSECURITY: ASSESSING THE IMMEDIATE THREAT TO THE UNITED
More informationARI 26/2013 (Translated from Spanish) 17 September 2013. Cyber cells: a tool for national cyber security and cyber defence
ARI ARI 26/2013 (Translated from Spanish) 17 September 2013 Cyber cells: a tool for national cyber security and cyber defence Thiber Theme 1 Cyber cells are effective tools that enable countries to operate,
More informationSwedish Code of Statutes
Swedish Code of Statutes Act on criminal responsibility for genocide, crimes against humanity and war crimes SFS 2014:406 Published 11 June 2014 issued on 28 May 2014. In accordance with a decision by
More informationNetwork Security Threat Matrix May 2004
May 2004 By Lawrence Allhands BlueMotorcycle Consulting 650/704-4821 2830 Flores #18 San Mateo, CA 94403 http://www.bluemotorcycle.com Abstract Know your enemy If you know the enemy and know yourself,
More informationUnited States Cyber Security in the 21st Century
United States Cyber Security in the 21st Century Austin Spears 63 Abstract: Highly sophisticated computer attacks are on the rise. Google, United States defense firms, and state governments are just a
More informationPrinciples of Soccer
What criteria can we use to tell how well our team is playing? Analysis of soccer always starts out with the same question, Who has the ball? Principle #1: Possession If our team has possession of the
More informationAmerican Public University System - A Multi-Disciplinary Approach to Cybersecurity Education
American Public University System - A Multi-Disciplinary Approach to Cybersecurity Education Dr. Clay Wilson, CISSP Program Director, Cybersecurity Studies American Public University System Overview About
More informationRoles and Responsibilities of Cyber Intelligence for Cyber Operations in Cyberspace
, pp.137-146 http://dx.doi.org/10.14257/ijseia.2014.8.9.11 Roles and Responsibilities of Cyber Intelligence for Cyber Operations in Cyberspace Jung ho Eom Military Studies, Daejeon University, 62 Daehakro,
More informationThe virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL
The virtual battle by Mark Smith Special to INSCOM 4 INSCOM JOURNAL For many, the term cyberspace conjures up images of science fiction, the stuff of novels and movies. In fact, in 1994 this was the term
More informationSUB Hamburg A/578680. Cyber Conflict. Competing National Perspectives. Edited by Daniel Ventre ) WILEY
SUB Hamburg A/578680 Cyber Conflict Competing National Perspectives Edited by Daniel Ventre ) WILEY Table of Contents Introduction xi Chapter 1. Canada's Cyber Security Policy: a Tortuous Path Toward a
More informationSpyware and Viruses. There is a distinct difference between spyware and viruses.
Spyware and Viruses Spyware and viruses are getting to be the largest problem in the battle of keeping your computer running smoothly and being able to use your computer with any kind of efficiency. There
More informationDEPARTMENT OF THE NAVY CH I EF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC 20350-2000
DEPARTMENT OF THE NAVY CH I EF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC 20350-2000 5000 Ser NOO / )00063 21 May 10 MEMORANDUM FOR DISTRIBUTION From: Subj: Ref: Encl: Chief of Naval Operations
More informationThe European Marine Energy Centre Ltd. HARASSMENT AND BULLYING POLICY
The European Marine Energy Centre Ltd. HARASSMENT AND BULLYING POLICY Table of Contents 1 Policy Statement... 3 2 Scope... 3 3 Definitions... 3 4 Detailed Guidelines... 5 4.1 What to do if you are being
More informationCyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015
Cyber Threats Insights from history and current operations Prepared by Cognitio May 5, 2015 About Cognitio Cognitio is a strategic consulting and engineering firm led by a team of former senior technology
More informationFAQ Exodus Proxima Centauri 07/2013
Resources & Population Q: Do I pay tax for the resources I had before together with the new ones? A: No, it is a tax per income, not per fortune. You pay tax for what you get fresh that turn. Q: My stash
More informationProspects for the NATO Warsaw Summit Testimony before the U.S. Helsinki Commission By Hans Binnendijk June 23, 2016
Prospects for the NATO Warsaw Summit Testimony before the U.S. Helsinki Commission By Hans Binnendijk June 23, 2016 NATO is anything but obsolete. It is needed more now than at any point since the end
More informationThe Nuclear Weapons Debate
Scottish CND - Education Pack The Nuclear Weapons Debate Scottish CND s educational resource Nuclear Weapons: Yes or No is aimed at late primary to early secondary school pupils. It has 4 units: The Nuclear
More informationRisk Identification Checklist for Stalking Cases (VS-DASH 2009) 1
Risk Identification Checklist for Stalking Cases (VS-DASH 2009) 1 There is still limited knowledge, awareness and education about stalking, even though the problem is getting bigger. Many people and agencies,
More informationTestimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy
Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy House Committee on Homeland Security Subcommittee on Cybersecurity, Infrastructure
More informationAT A HEARING ENTITLED THREATS TO THE HOMELAND
STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND
More informationExamples of International terrorist attacks since 9/11
PAPER ONE INTERNATIONAL TERRORISM: THE THREAT Any discussion of the Government s strategy to reduce the threat from international terrorism to the UK and its citizens must begin with the nature of the
More informationCovert Operations: Kill Chain Actions using Security Analytics
Covert Operations: Kill Chain Actions using Security Analytics Written by Aman Diwakar Twitter: https://twitter.com/ddos LinkedIn: http://www.linkedin.com/pub/aman-diwakar-ccie-cissp/5/217/4b7 In Special
More informationCyber Security Management
Cyber Security Management Focusing on managing your IT Security effectively. By Anthony Goodeill With the news cycles regularly announcing a recurrently theme of targets of hacker attacks and companies
More informationthe Council of Councils initiative
Author: Andrea Renda, Senior Research Fellow, Centre for European Policy Studies May 3, 2013 Editor's note: This brief is a feature of the Council of Councils initiative, gathering opinions from global
More informationNeoscope www.neoscopeit.com 888.810.9077
Your law firm depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine your practice without IT. Today,
More informationTo use the Muslim concept of Jihad to understand Muslim attitudes to war.
To use the Muslim concept of Jihad to understand Muslim attitudes to war. Grade C All will be able to describe the meaning of greater and lesser JIHAD. Grade B Most will be able to explain why the concept
More informationBeyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
More informationSecurity & privacy in the cloud; an easy road?
Security & privacy in the cloud; an easy road? A journey to the trusted cloud Martin Vliem CISSP, CISA National Security Officer Microsoft The Netherlands mvliem@microsoft.com THE SHIFT O L D W O R L D
More information10 Hidden IT Risks That Might Threaten Your Business
(Plus 1 Fast Way to Find Them) Your business depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine
More informationKeren Elazari Hackers: The Internet s Immune System
Keren Elazari Hackers: The Internet s Immune System For the past three decades, hackers have done a lot of things, but they have also impacted civil liberties, innovation and Internet freedom, so I think
More informationInternet security: Shutting the doors to keep hackers off your network
Internet security: Shutting the doors to keep hackers off your network A Paralogic Networks Guide www.scholarisintl.com Introduction Like all revolutionary steps in technological development the Internet
More informationOn the European experience in critical infrastructure protection
DCAF a centre for security, development and the rule of law On the European experience in critical infrastructure protection Valeri R. RATCHEV ratchevv@yahoo.com @ratchevv DCAF/CSDM 1 This presentation
More informationPROTECT YOUR FINANCIAL TRANSACTIONS
PROTECT YOUR FINANCIAL TRANSACTIONS Caisses populaires acadiennes www.acadie.com/en It s a wealth of ways to strengthen the security of your financial transactions. By implementing simple measures to mitigate
More informationPolicy wording. General conditions. AMI Businesspack Business Insurance. Your duty to comply. About this Businesspack policy. Interpreting this Policy
AMI Businesspack Business Insurance Policy wording Welcome, thanks for choosing to protect your business with IAG New Zealand Limited. AMI Insurance Limited is part of the IAG group of companies in New
More informationThe Future of Hacking
The Future of Hacking An Ethical Hacker s View Peter Wood Chief of Operations First Base Technologies Who am I? Started in electronics in 1969 Worked in networked computers since 1976 Second microcomputer
More informationTrends in Malware DRAFT OUTLINE. Wednesday, October 10, 12
Trends in Malware DRAFT OUTLINE Presentation Synopsis Security is often a game of cat and mouse as security professionals and attackers each vie to stay one step ahead of the other. In this race for dominance,
More information