Cyber Warfare Is Integral To Modern International Politics

Defacement of Russina Websites by Anonymous Ukraine: sensecy.com

Cyber-operations are being used for a wide range of information warfare and intelligence gathering purposes, including in the war between Russia and Ukraine, according to a new book published today by the NATO Cooperative Cyber Defence Centre of Excellence (CCDCE). http://bit.ly/1IlrfOG

“In Ukraine, cyber-operations have been used hand-in-hand with information warfare and intelligence initiatives,” explained Sven Sakkov, director of the Tallinn-based NATO CCDCE, which has published Cyber War in Perspective: Russian Aggression against Ukraine. 

He adds: “Phone hacks, website defacements, and politically motivated cyber-attacks served a wider purpose. It demonstrates that computer-based warfare is very unlikely to happen in isolation, it is rather integrated into how nations assert power, potentially using any and all means possible.”

“The world is moving toward a greater strategic use of cyber-capabilities to persuade adversaries to change their behaviour,” explains Jarno Limnéll, Professor of cyber-security at Aalto University and one of the authors. “Smaller countries such as Finland and Estonia, with a strong heritage of technical capability and experience, may possess some advantages in the cyber-domain that not even great powers could dream of,” adds Professor Limnéll.

Kenneth Geers, NATO CCD COE Ambassador, Non-Resident Senior Fellow at the Atlantic Council, Visiting Professor at the Taras Shevchenko National University of Kyiv and editor of the publication, describes how, “...more than 20 experts in network security and national defence examine the cyber-dimension of the ongoing geopolitical conflict between Russia and Ukraine, and explain how cyber attacks can influence international crises in the Internet era”.

Over its 18 chapters scholars and practitioners identify the tactical and strategic implications of cyber-operations and discuss their significance for policy and law, and analyse many aspects of information warfare. The Ukraine crisis between 2013-2015 provides a case study to examine digital propaganda, denial-of-service (DoS) campaigns, website defacements, and information leaks by hacktivists, cutting-edge cyber-espionage malware, physical attacks on Internet infrastructure, and even an attempt to spoil the Ukrainian Presidential election.
Ein News: http://bit.ly/1jI6ktt

« IoT Turns Cities Into Cyber Battlegrounds
Prediction Can Replace Prevention As A Security Strategy »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Phoenix TS

Phoenix TS

Phoenix TS offers world-class management, computer, and IT security certification training courses.

Tanium

Tanium

Tanium is an endpoint security and systems management company.

Cyfor

Cyfor

Cyfor provides digital forensics and eDiscovery in civil, criminal, intellectual property, litigation and dispute resolution investigations.

CSIS Security Group

CSIS Security Group

CSIS provide actionable threat intelligence, prevention, incident response and 24/7 managed security services.

techUK

techUK

techUK represents companies operating in the tech sector in the UK. Focus areas cover all aspects of ICT including cyber security.

PSYND

PSYND

PSYND is a Swiss consultancy company based in Geneva specialized in CyberSecurity and Identity & Access Management.

SyncDog

SyncDog

SyncDog is a leader in enterprise security and the preeminent vendor for containerized mobile application security across cloud & on-premise computing environments.

Protected Media

Protected Media

Protected Media’s advanced cybersecurity ad fraud solution guards you against current and emerging threats across Connected TV, Display and Video advertising.

Tonex

Tonex

Tonex providing industry-leading technology training, courses, seminars, workshops, and consulting services to companies and government organizations around the world.

Cylab - Carnegie Mellon University

Cylab - Carnegie Mellon University

Carnegie Mellon University CyLab is the University's security and privacy research institute.

GoodAccess

GoodAccess

GoodAccess is the cybersecurity platform that gives your business the security benefits of zero trust without the complexities so your users can securely access digital resources anytime, anywhere.

Hetz Ventures

Hetz Ventures

Hetz Ventures is a global-facing VC investing in highly talented and ambitious Israeli founders who operate at the cutting edge of deep technology.

AdviserCyber

AdviserCyber

AdviserCyber provide Cybersecurity and Compliance Solutions for Registered Investment Advisers.

DART Consulting & Training

DART Consulting & Training

DART is a leading cyber training and consultancy company. We enhance our clients’ cyber capabilities by growing and strengthening their frontline defense – the cyber teams.

Aim Security

Aim Security

Aim empowers enterprises to unlock the full potential of GenAI technology without compromising security. GenAI makes business better - Aim makes GenAI secure.

Tychon

Tychon

Tychon develops advanced enterprise endpoint management technology that enables commercial and government organizations to bridge the gap between security and IT operations.