The Emerging Domain Of Cyber War

Cyber warfare is the use of technology to attack a nation's computers or information networks, causing comparable harm to actual warfare, be it damage, death or destruction. It has many advantages as great distances can be crossed in seconds or even less, without the need for planes, tanks, soldiers or ships or satellites and it can be done often without the opponent knowing what is actually happening.

It can take down computer security, knock-out electricity and power systems and can also be used to steal military secrets, engage in propaganda and fake news, which increases the fear and misunderstanding in the population who often don’t know that it is under attack.

There is argument and debate regarding the definition of cyber warfare. There are differing views about what the term cyber war actually means, and some say that there have not been any cyber-attacks that can be described as warfare. 
However, the pace, frequency, and intensity of cyber-attacks are now greater than ever. As the physical realm inevitably merges with the cyber one, forming a new kind of infrastructure, cyber attacks on this infrastructure can have a catastrophic impact on our energy, waste, water, transportation, and telecommunications facilities. 

Most countries are completely under-prepared to protect their people and property against such attacks and it is predicted by Juniper Research that the cost of cyber crimes will exceed $5 trillion over the next five years.

Russia and China are developing cyber weapons to use in any future cyber conflict and the US, France, UK and Israel are just as active as nation states leading the way in these endeavors. The Stuxnet malware was one example of a cyber war attack which was a joint cyber venture between Israel and the USA to destroy Iran's nuclear programme capability. 

What Is Cyber War?

Cyber warfare refers to the use of digital attacks, like computer viruses and hacking, by one country to disrupt the vital computer systems of another, with the aim of creating damage, death and destruction. A shadowy world that is still filled with spies, hackers and top secret digital weapons projects, cyber warfare is an increasingly common, and dangerous, feature of international conflicts. 

Future wars will see hackers using computer code to attack an enemy's infrastructure, fighting alongside troops using conventional weapons like guns and missiles.

Right now the combination of an ongoing cyber warfare arms race and a lack of clear rules governing online conflict means there is a real risk that incidents could rapidly escalate out of control. The state of international relations is dominated by the Coronavirus epidemic, causing big problems for governments and organisations who find they now have to manage numerous  homeworking employees.

The cyber security issues have increased significantly as systems security is now under so much more pressure as employees often ignore their organisations cyber security requirements.

Security compliance is the central nervous system of an organisation’s cyber posture. It disseminates intelligence and coordinates offensive and defensive measures to protect the organisation from foreign intrusion. Using artificial intelligence, security professionals can peel away the complex layers of government and shed light on the underlying infrastructure and its vulnerabilities.

Just like normal warfare which can range from limited skirmishes to full-on battles, the impact of cyberwarfare will vary by target and severity. 

In many cases the computer systems are not the final target, they are being targeted because of their role in managing real-world infrastructure like airports or power grids. Knock out the computers and you can shut down the airport or the power station as a result. Cyber warfare takes place at a speed physical warfare is simply incapable of. It is fast, sudden, and uninhibited by the size of forces, complexity of the terrain, location, or the unity of alliances. Rather than relying on a human force, bad actors use automated minions to wreak havoc. 

The speed at which we detect, analyse, and respond to security incidents will affect who wins this war. Blockchain and AI can be used to accelerate the security process.

  • The blockchain’s shared distributed ledger can be used for storing security events and incidents to provide an immutable source of truth.  
  • AI can analyse that data to predict threats based on patterns and anomalies. Humans may be smarter but robots are faster. If supervised correctly, robots can evolve and execute tasks with less bias, fewer mistakes, and reduced downtime.

The greatest security threats to an organisation are the people who operate it. If security is too complex, people will either avoid or circumvent the process. 

In the future the most likely targets are military systems thereby preventing commanders from communicating with their troops or seeing where the enemy is therefore giving an advantage to the enemy. Education is key to promoting organisational cyber security hygiene. Organisations must build a culture of awareness to respond to any crisis, the organisations must constantly measure, assess, and improve the cyber security maturity model. This can be achieved by using AI to analyse the workforce and make strategic, targeting investments to elevate the workforce’s understanding of security.

AI can be used to identify clusters of people who follow security policies as well as those who take shortcuts. Training resources can then be used in a more efficient, targeted manner.

Most developed economies rely on computerised systems for everything from power to food and transport, many governments are very worried that rival states may target critical national infrastructure. Supervisory control and data acquisition (SCADA) systems, or industrial control systems, which run factories, power stations and other industrial processes, are a big target, as Stuxnet showed.

These systems can be decades old and were rarely designed with security as a priority, but are increasingly being connected to the internet to make them more efficient or easy to monitor. 

But this also makes these systems more vulnerable to attack, and security is rarely upgraded because the organisations operating them do not consider themselves to be a target. Recently Britain’s most senior cyber general Gen Sir Patrick Sanders, who heads the UK’s strategic command said the UK possesses the capacity to “degrade, disrupt and destroy” its enemies’ critical infrastructure in a future cyber conflict, in a rare acknowledgement of the military’s offensive hacking capability. 

As the cyber war arms race escalates, none of the suggested cyber-peace initiatives has gained much traction. Critics point out that cyber-attack motives are hard to define, a cyber espionage or reconnaissance intrusion can often look a lot like a cyberwar attack in progress, and determining the identities of the hackers responsible can often be even harder.

What the world needs now is an international treaty to monitor and restrain the possibilities for cyber earfare.

IT Pro:      Oodaloop:       ZDNet:     Wired:       Guardian:

You Might Also Read:

Cyber Warfare, Intelligence & Malware:

 

« Is Big Tech 'Fixing' The US Election?
Iranian Government Agencies Hacked »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NQA Certification

NQA Certification

NQA provides certification to a range of ISO standards including ISO 27001 for information security management.

Portnox

Portnox

In 2007, Portnox set out to create one of the world’s easiest to use, most loved, value-driven network security solutions — and our customers will tell you we’ve succeeded.

Secret Double Octopus

Secret Double Octopus

Secret Double Octopus offers the world’s only keyless multi-shield authentication technology for users and things.

Elliptic

Elliptic

Elliptic solve the crucial problem of identity in cryptocurrencies, with the sole purpose of combating suspicious and criminal activity.

Very Good Security (VGS)

Very Good Security (VGS)

VGS is the modern approach to data security. Our SaaS solution gives you all the benefits of interacting with sensitive and regulated data without the liability of securing it.

Connectitude

Connectitude

Connectitude IIoT Platform ™ is a complete solution for industrial IIoT.

Netlawgic Legal Services

Netlawgic Legal Services

Netlawgic is exclusively focused on delivering cyber law solutions to the industry. We provide our clients with specialized attention and problem solving in all aspects of cyber law.

Elemental Cyber Security

Elemental Cyber Security

Elemental is a game changing cyber security compliance automation and enforcement technology provider.

Neovera

Neovera

Neovera is a trusted provider of managed services including cyber security and enterprise cloud solutions, committed to delivering results through the innovative use of scalable enterprise-grade tech.

Bitbone

Bitbone

Bitbone develop IT infrastructure and IT security solutions that create long-term value.

Identity Management Institute (IMI)

Identity Management Institute (IMI)

Identity Management Institute (IMI) provides professional training and certification in cyber security with a focus on identity and access management, identity theft, and data protection.

Matrixforce

Matrixforce

Matrixforce is a vetted IT support provider that uses the patented Delta Method of streamlining technology for financial and professional service firms to reduce complexity and avoid risk.

Cyral

Cyral

Easily observe, control, and protect your data endpoints in a cloud and DevOps-first world. Discover Data Mesh Security with Cyral.

Herzing College

Herzing College

Herzing College Ottawa offers an accelerated 12-month Cybersecurity Specialist training program. This program is developed by industry experts and based on leading IT security certifications.

HCS

HCS

HCS is an IT Company and Telecoms provider with an experienced team who are dedicated to ensuring our clients business systems are protected.

Frenos

Frenos

The Frenos Platform helps enterprises understand their most probable attack paths while highlighting the most effective risk mitigations to deter and defend against today’s adversaries.