Cyber Warfare: An Integral Part of Modern Politics

 

Cyber-operations are being used for a wide range of information warfare and intelligence gathering purposes, including in the war between Russia and Ukraine, according to a new book published recently by the NATO Cooperative Cyber Defence Centre of Excellence (CCDCE).

“In Ukraine, cyber-operations have been used hand-in-hand with information warfare and intelligence initiatives,” explained Sven Sakkov, director of the Tallinn-based NATO CCDCE, which has published Cyber War in Perspective: Russian Aggression against Ukraine.

He adds: “Phone hacks, website defacements, and politically motivated cyber-attacks served a wider purpose. It demonstrates that computer-based warfare is very unlikely to happen in isolation, it is rather integrated into how nations assert power, potentially using any and all means possible.”

“The world is moving toward a greater strategic use of cyber-capabilities to persuade adversaries to change their behaviour,” explains Jarno Limnéll, Professor of cyber-security at Aalto University and one of the authors. “Smaller countries such as Finland and Estonia, with a strong heritage of technical capability and experience, may possess some advantages in the cyber-domain that not even great powers could dream of,” adds Professor Limnéll.

Kenneth Geers, NATO CCD COE Ambassador, Non-Resident Senior Fellow at the Atlantic Council, Visiting Professor at the Taras Shevchenko National University of Kyiv and editor of the publication, describes how, “...more than 20 experts in network security and national defence examine the cyber-dimension of the ongoing geopolitical conflict between Russia and Ukraine, and explain how cyber attacks can influence international crises in the Internet era”.

Over its 18 chapters scholars and practitioners identify the tactical and strategic implications of cyber-operations and discuss their significance for policy and law, and analyse many aspects of information warfare. The Ukraine crisis between 2013-2015 provides a case study to examine digital propaganda, denial-of-service (DoS) campaigns, website defacements, and information leaks by hacktivists, cutting-edge cyber-espionage malware, physical attacks on Internet infrastructure, and even an attempt to spoil the Ukrainian Presidential election.

Ein News: http://bit.ly/1RlX6Sj

« The Future Of Healthcare Systems Is ‘Unsexy Plumbing’
Malware Mixed Into A Cyber Threat Cocktail »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

UpGuard

UpGuard

UpGuard's discovery engine brings visibility to complex IT environments, enabling teams to identify risk, confirm compliance and make business safer.

Institute for Critical Infrastructure Technology (ICIT)

Institute for Critical Infrastructure Technology (ICIT)

ICIT is a leading cybersecurity think tank providing objective research, advisory, and education to legislative, commercial, and public-sector cybersecurity stakeholders.

ECOS Technology

ECOS Technology

ECOS Technology specializes in the development and sale of IT solutions for high-security remote access as well as the management of certificates and smart cards.

Trustless Computing Association (TCA)

Trustless Computing Association (TCA)

TCA is is a non-profit organization promoting the creation and wide availability of IT and AI technologies that are radically more secure and accountable than today’s state of the art.

Euro-Recycling

Euro-Recycling

Euro-Recycling is a leading UK provider of Secure On-Site Data Media Destruction Services.

Fiserv

Fiserv

Fiserv offers a wide array of Risk & Compliance solutions to help you prevent losses from fraud and ensure adherence to regulatory and compliance mandates.

Wolf Hill Group

Wolf Hill Group

Wolf Hill Group, a Slone Partners company, is a national recruitment firm focused on Cybersecurity.

State Service of Special Communications & Information Protection of Ukraine (SSSCIP)

State Service of Special Communications & Information Protection of Ukraine (SSSCIP)

State Service of Special Communications and Information Protection is the technical security and intelligence service of Ukraine, under the control of the President of Ukraine.

Torq

Torq

Torq's no-code automation modernizes how security & operations teams work with easy workflow building, limitless integrations and numerous pre-built templates.

Punk Security

Punk Security

Punk Security are specialists in integrating security into DevOps pipelines, enabling rapid and secure development.

Liminal

Liminal

Liminal is a boutique strategy advisory firm serving digital identity, fintech, and cybersecurity clients, and the private equity / venture capital community.

Bastion Networks

Bastion Networks

Bastion are a security-focussed managed solution provider and consultancy. We work with advanced cyber security vendors to produce managed security solutions to protect from online threats.

ASRC Federal

ASRC Federal

ASRC Federal’s mission is to help federal civilian, intelligence and defense agencies achieve successful outcomes and elevate their mission performance.

Datapac

Datapac

Datapac is one of Ireland’s largest and most successful ICT solutions and services providers. We have been at the forefront of technology innovation in Ireland for the past three decades.

at-yet (@-yet)

at-yet (@-yet)

at-yet are an interdisciplinary team of experts. We are all about achieving results, whatever the situation – an acute incident, risk minimisation, safeguarding or data protection.

Iron EagleX

Iron EagleX

Iron EagleX deliver engineering solutions in cloud computing, big data, cyber, and machine learning technologies to US Government customers.