Cyber war

Post on 19-May-2015

338 views 2 download

Transcript of Cyber war

Cyber WarCyber War

Warfare in the Information AgeWarfare in the Information Age

ContentsContents

ContentsContents

1.1. What is Cyber War?What is Cyber War?2.2. Evolution and techniquesEvolution and techniques3.3. Targets and tacticsTargets and tactics4.4. ConsequencesConsequences5.5. Examples and precedentsExamples and precedents6.6. Future?Future?

ConclusionConclusion

1. What is Cyber Warfare?1. What is Cyber Warfare?

1. What is Cyber Warfare?1. What is Cyber Warfare?

Cyber war refers to:

• conducting military operations according to information-related principles;

• disrupting or destroying information and communication systems;

• the use of computers and internet to achieve military goals;

• turning the "balance of information and knowledge" in one's favour.

1. What is Cyber Warfare?1. What is Cyber Warfare?

• At first sight:

– No real threat: “you can’t see it”

• In reality:– it is everywhere– There are thousands of attacks everyday

2. Evolution and techniques2. Evolution and techniques

2. Evolution and techniques2. Evolution and techniques

• Network based military institute (eg: Al Qaida)– Small units– Lateral organisation structure– Increased “top sight”– Decentralisation of command and control

• Traditional military institute (eg: US army)

2. Evolution and techniques2. Evolution and techniques

• Hackers:– Developing “profoundly different kinds of code

breaking techniques”– Eg: linking hundreds of computers (zombie

computers) massively increased computing power

• Virusses

• Physical destruction of IT infrastructures

3. Targets and tactics3. Targets and tactics

3. Targets and tactics3. Targets and tactics

• IT ifrastructures– Networks: internet/intranet– servers

• Powergrid– Scata

• Air traffic• Water supply• Strategic information (espionage)

– Stealing information– Messing with or destroying information

4. Consequences4. Consequences

4. Consequences4. Consequences

• Taking down powergrid, water supply:– On a large scale– Serious humanitary consequences– ...

• Communication systems fail:– Internet– Military information streams collapse– ...

5. Examples and precedents5. Examples and precedents

5. Examples and precedents5. Examples and precedents

• Attack on the White House– 100.000’s computers sending pings

• Attack on US East Coast powersupplies– No electricty for a couple of days

• Attack on Wall Street– $3 billion loss

• Chinese hackers• National Georgian server taken down• Iranian server taken down• ...

6. Future?6. Future?

6. Future?6. Future?

• Cyber defenses is one of the top concerns of the US defense systems:– Very vulnerable to attack– How respond to attacks?– Use Cyberwarfare themselves?

ConclusionConclusion

ConclusionConclusion

• Cyber Warfare can obtain a striking force compared to or greater than a traditional army

• Nations such as the USA are vulnerable to attacks, as they depend a lot on information technology

Thank you for your attentionThank you for your attention

Questions?Questions?