Cyber Warfare Is The New Frontier

Cyber warfare is the next frontier of war, where one state uses viruses and hacking to cripple an enemy state’s computer systems, take down their electronic and power systems, removing their ability to access information and communication. Cyber warfare methods have already been used to compromise various countries’ computer systems and infrastructure.

Misinformation campaigns are being widely used across the Internet to influence elections in the UK and US. Alongside the US, Russia, China, Iran and N Korea are among the more prepared nations in terms of cyber warfare capabilities.

This is triggering a cyber arms race, with more than 30 countries trying to develop more advanced capabilities while simultaneously upgrading their defences.

Right now, there is a lack of clear international rules governing the use of cyber weapons. Currently there is disagreement as to what cyberwar actually is and might be in the future. This is broadly similar to the arguments that went on prior to the 1st World War about airplanes and whether they had a credible military function. The initial campaigns of 1914 proved that cavalry could no longer provide the reconnaissance expected by their generals, in the face of the greatly increased firepower of twentieth century armies and it was quickly realised that aircraft could at least locate the enemy.

Since the beginning of the Coronavirus pandemic there has been an upsurge of incidents related to cyber attacks, hacking and data breaches, which highlights that the Internet is not safe. It is imperative to be aware of cyber warfare, as awareness is the first most important step to understanding its implications. Cyber warfare currently refers to cyber-attacks by one country or state against another. However, it can also be an attack by hackers or terrorists aimed at furthering the mission of the individual nation. Government spy agencies are using cyber hacking to view and steal secret data about government intentions. 

Furthermore, cyber attacks can take down a countries electrical and electronic systems and attacks could alter stock prices, knock out emergency services, weaken military responsiveness and disrupt the economy. 

Despite the efforts of the EU tries to obtain a common cyberspace policy and common regulations on the internet,  there are  gaps in the cyber policymaking that leaves the EU nations to cyber threats.  As global tensions grow and cyber weapons mature, it seems evident that this digital iteration of international conflict is occurring with few to no agreed upon (or even informally understood) laws of cyber conflict, increasing uncertainty, the potential for collateral damage, and the likelihood of unintended escalation.

Cyber warfare can be launched instantly, leaving room for speculation and making it difficult to counter. The weapons of cyber war are like those being used by cyber-criminals. It can vary from the very sophisticated to the complete basic. DDoS is one of the unruly weapons. Spear-phishing and social engineering are other standard weapons used to introduce an attacker to the computer of an opponent.

In a cyber war, the chance of early warning is non-existent and it can be very difficult to identify who may have attack ed you. The future of cyber warfare will be determined by two things: 

  • Mindset: The great advances in information and communications technology have an unprecedented impact on our society; a considerable percentage of our life and activities has come to depend heavily on information infrastructure.  This dependence is very much apparent in both the public and private sectors.
  • Technology: Vital factors of public life such as air, road, and railway traffic control, the dissemination of energy like electricity or gas, telecommunication systems, key government sectors such as national defense are now organized and controlled through the use of computers and networked systems. 

Since there is no international law that governs the use of cyber-arms, the legal status of this new frontier is still blurred.

This does not mean that cyber warfare is not covered by the law. The Cooperative Cyber Defence Centre of Excellence (CCDCoE) has released a textbook called Tallinn Manual, which covers the rare but serious cyber-threats. The manual sets out when a cyber-attack is a breach of international law and how nations can respond to such violations.

Under the pressure of cyber warfare, the governments of many countries have unveiled a viable national security policy to ensure the security of their information infrastructure in cyber space. 

Together with the convenience technology has brought, it has also caused a surge in cyber-threats, which tells another story. 

There is no need to stop adopting technology, but we should determine what rules will control its uses. In the same line, cyber warfare is an uncharted area, which will raise risk situations. Only by increasing security and collecting intelligence, new policies to strengthen security practices be built.

Future Technology::      Infosecurity Magazine:    Risk Based Security:       The Cove:     

NextWeb:      HelpNetSecurity:    VHR:       Tech Times:        Wired:    

You Might Also Read: 

The Emerging Domain Of  Cyber War:

 

« How to Transition From Remote Work To A Secure & Agile Workforce
Criminals Have Ramped Up Covid-19 Related Attacks »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Certification Europe

Certification Europe

Certification Europe (now Amtivo Ireland) is an accredited certification body which provides ISO management system certification, including ISO 27001.

Surrey Centre for Cyber Security (SCCS)

Surrey Centre for Cyber Security (SCCS)

The Centre focuses on three main research directions - Privacy and Data Protection, Secure Communications, and Human-Centred Security.

Cognizant

Cognizant

Cognizant offer services and solutions for IT Infrastructure Security, Enterprise Mobility and Internet of Things.

ZyberSafe

ZyberSafe

ZyberSafe is an innovative Danish company specialized within building hardware encryption solutions.

Lawley Insurance

Lawley Insurance

Lawley is a full-service, independent insurance agency. Specialty insurance products include Cyber Security.

Antiy Labs

Antiy Labs

Antiy Labs is a vender of antivirus engine and solution, providing the best-in-breed antivirus engine and next generation antivirus services for confronting PC malware and mobile malware.

HKCERT

HKCERT

HKCERT is the centre for coordination of computer security incident response for local enterprises and Internet Users in Hong Kong.

Templar Shield

Templar Shield

Templar Shield is a premier information security, risk and compliance technology professional services firm serving North America.

Finnish Security & Intelligence Service (SUPO)

Finnish Security & Intelligence Service (SUPO)

The Finnish Security and Intelligence Service is a government agency tasked with combating serious threats to national security in Finland.

Upfront Security

Upfront Security

Upfront Security helps companies with innovative products & services to prevent, recognise and recover from (identity) fraud.

Robo Shadow

Robo Shadow

Robo Shadow are trying to bridge the gap between the top tier organisations that can afford everything and everyone else who has to “Make it up as they go along” when it comes to Cyber.

Truvantis

Truvantis

Truvantis is a cybersecurity consulting organization providing best-in-class cybersecurity services to secure your organization’s infrastructure, data, operations and products.

Kiteworks

Kiteworks

Kiteworks (formerly Accellion) creates a dedicated Private Content Network that ensures zero-trust private content protection and compliance.

Cyber1

Cyber1

CYBER1 is a leader in cyber security advisory and solutions. We are uniquely placed to help customers achieve cyber resilience and thus, safeguard reputation and value.

CyberEPQ

CyberEPQ

CyberEPQ (Cyber Extended Project Qualification) is the UK’s first and only Extended Project Qualification in Cyber Security.

Toro Solutions

Toro Solutions

Toro provide managed security & consultancy to keep governments, businesses & society resilient in the space where cyber, physical & people security converge.