Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 14

Presented By,

Pratheek.P.Nair Bhavya. Dona Suraj Mahalakshmi Anju Jyothilakshmi

Cyber WarFare

Cyber WarFare
Actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption
Richard A. Clarke, Cyber War

Cyberwarfare is Internet-based conflict involving politically motivated attacks on information and information systems

Cyberwarfare attacks can disable official websites and networks, disrupt or disable essential services, steal or alter classified data, and criple financial systems -- among many other possibilities.
2

Related Terms and Issues


Cyber-terrorism parallel definition, different actor actions by terrorists to penetrate another nation's computers or networks for the purposes of causing damage or disruption Cyber-spying / cyber-espionage actions by parties outside of a country or organization to penetrate another nation's computers or networks for the purposes of stealing information Increasingly difficult to distinguish countries and organizations Countries may be (increasing evidence that they are) using 3rd parties (organized crime, other organizations) to do their work

Infrastructure Subject to Attack


Businesses Military command and control system Transportation systems
Air Rail

Power grid Manufacturing facilities Communication systems VoIP


4

Technological Approaches for Cyberattacks


Three Major Approaches 1) Break in, steal information From computer systems or networks

2) Directly affect functionality of computers or related equipment through use of worms, viruses, logic bombs and/or other malware 3) Denial of Service (DoS) flood of messages to computer systems that overwhelms them and renders them non-functional
5

Impacts of Cyber Warfare


INTELLIGENCE BRIEFING

Impact of a Cyber War


The political fallout of a cyber attack will be high, but this will pale in comparison to the financial and economic impact!

Physical Impact Social Impact Political Impact

The financial and economic impact could be as high as $30 billion a day!

Financial Impact

Low
Copyright 2003 2007 All Rights Reserved

Medium

High
2

Cyber War Activity


1. Titan Rain (2003-on) Coordinated attacks on US military and industrial computer systems Chinese military gained access to computer systems and networks of US including Lockheed Martin, Sandia National Laboratories, and NASA.

2. Syria (Sept. 2007) Israeli aerial bombing of facility in Syria, alleged nuclear facility being constructed by North Koreans Syrian air defense networks saw no planes; later found Russian-built radar system screens manipulated to show nothing
8

Cyber War Activity


3. Estonia (April 2007)
Sometimes referred to as Web War 1 Sophisticated and large set of denial of service (DoS) attacks on Estonian parliament, banks, ministries, newspapers, other web sitesevere effect for 3 weeks.
4. Stuxnet Worm Very complex Windows-specific computer worm that infects computers and connected industrial control equipment (PLCs) First known worm to attack industrial infrastructure Spreads through USB thumb drives as well as network connections
9

Cyber WarFare in India


In 2007, there were 217 such attacks and in 2010 and 2011 the attacks went up to 966 and 1,000 respectively. A group, which called itself the Pakistan Cyber Army, hacked the Central Bureau of Investigation website in December 2010. In bulk of the rumors that triggered panic among the people of northeastern states in Karnataka, Tamil Nadu and Maharashtra were sourced from Pakistan. Websites used images of people killed in cyclones and earthquakes and passed them off as Muslims killed in violence. Team_H4tr!ck, which have been largely responsible for hacking Indian websites.

10

Cyber Defence
There are four key goals in cyber defense The first is to establish a protective cyber environment. The second is attack detection Third, systems that have been compromised need to be restored quickly and efficiently.

The fourth and final goal is attack response.

11

Conclusion
1) Enact limited government regulation of internet, cyberspace Need international cooperation as well as national efforts 2) Increase resources for cyber-defense (government, private) 3) Isolate critical infrastructure (e.g. power grid) from the internet 4) Investigate cyber-treaties

12

References

www.101rl.com/survivalfiles/files/home/Cyber%20Warfare.pdf www.chathamhouse.org/sites/default/files/.../r1110_cyberwarfare.pdf http://searchsecurity.techtarget.com/definition/cyberwarfare www.ists.dartmouth.edu/docs/cyberwarfare.pdf https://www.symantec.com/avcenter/reference/cyberterrorism.pdf

13

Thank you

You might also like