A look at the complex cyber security chess game

Venustus

Level 59
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Dec 30, 2012
4,809
AUSTIN – Information security has never been more front and center than it is now. The recent hacking of the Democratic National Committee; the implications that Russia — a sovereign country — may have been deeply involved; the potential implication it had on a national election; and the accusations, difficulty in establishing proof, and what can be done about it, all form a perfect backdrop for a look at cyber attacks, cyber war, cyber espionage, and general cyber-malfeasance. At South by Southwest, Sean Kanuck laid out a framework for thinking about cyber attacks, the sometimes similar but mostly different form of warfare it can be, and some ways where escalation of this new form of attack can be limited going forward.

Kanuck is a lawyer, ex CIA officer, the US’s first National Intelligence Officer for Cyber Issues from 2011 to 2016, and is currently affiliated with Stanford’s Center for International Security and Cooperation. He framed cyber conflict by defining terms, and comparing and contrasting cyber conflict with traditional armed conflict. To start, he refutes that we should consider cyber war as another domain of war, like land, sea, or air. Cyber is a means to an end, a way to disrupt information flow or processes that depend on it, or to corrupt that information and make it unreliable. Cyber attacks are another form of obtaining a strategic result, not a form of war in and of itself.

Cyber war vs. traditional war
There are many ways in which cyber conflict differs from typical conflicts. An attack can come from anywhere, and it is difficult to tell from where it originated. It’s possible and not immediately obvious, for example, that it could come from a 400-pound hacker in his pajamas in an apartment – but it’s not likely in the case of the best orchestrated attacks. Because of the worldwide, distributed nature of the Internet, it could come from literally anywhere.

The tools used are perishable, designed specifically for the target, and unpredictable. While a bullet is designed to do the same damage to any human anywhere, and it’s predictable what it can do, the tools used to attack an electric grid or steal classified information are different than what may be used to hack a router or internet-connected camera and make them do nefarious things. Using a war analogy, under the Geneva Convention rules of war there are definitions as to what constitutes a legitimate military target. Communications networks (and the internet that runs on it) carry both military and civilian information flow, so there is no separation of target – everything is essentially fair game.

The newest trends in cyber attacks have gone beyond disruptive denial of service attacks on internet sites. Industry and infrastructure like power grids and ATM networks are targets, which could cause large social disruptions. Indirection is heavily used, making it difficult to prove who is behind an attack. Perhaps the most dangerous form is the integrity of information attack – where the network or service is not disrupted, but information is modified, and the target doesn’t know it’s been attacked, as there is no stoppage or sign of disruption. One could see how this, used on financial services or healthcare for example, could be highly dangerous.
Further reading
 
Last edited by a moderator:

Winter Soldier

Level 25
Verified
Top Poster
Well-known
Feb 13, 2017
1,486
Thanks for sharing :)

The problems in identifying the perpetrators of this kind of attacks, are paradigmatic of the difficulty to give a precise definition to the expression “cyber war”. For this reason, many experts believe it is better to speak of “cyber terrorism”. A war, in fact, to be defined as such in the conventional sense of the term, it needed the participation of at least two actors, well-defined and identifiable. To find the perpetrators of a cyber attack it is often difficult. For this reason the reactions to cyber attacks, in the end are similar more to the actions you carry out against terrorism, made mostly of espionage and counter-espionage, rather than conventional wars.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top