0% found this document useful (0 votes)
1K views14 pages

Cyber-Warfare: The Future Is Now!

Cyber-warfare poses a significant threat, as attacks are now occurring daily on a large scale and global level, despite requiring minimal costs and effort. Various state and non-state actors target critical infrastructure and steal sensitive information from government, healthcare, education and business sectors. While laws and policies aim to address this growing challenge, increased investments in cybersecurity capabilities are still needed to counter the frequent and sophisticated cyber-threats facing nations and organizations.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views14 pages

Cyber-Warfare: The Future Is Now!

Cyber-warfare poses a significant threat, as attacks are now occurring daily on a large scale and global level, despite requiring minimal costs and effort. Various state and non-state actors target critical infrastructure and steal sensitive information from government, healthcare, education and business sectors. While laws and policies aim to address this growing challenge, increased investments in cybersecurity capabilities are still needed to counter the frequent and sophisticated cyber-threats facing nations and organizations.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

Cyber-Warfare:

The Future is Now!


Agenda

• BLUF - Bottom Line Up Front

• Cyber-Warfare - 5Ws

• Cyber-Threats and Targets

• Economic Impact and Cyber-Law

• Questions
BLUF
(Bottom Line Up Front)
• Significantly increased over the last decade
• Frequency, scale, sophistication, and severity of impact

• Thousands of attacks daily


• ~240 New forms of Malware released each day

• Requires minimal cost and effort


• Malicious Tools easily found on the “DarkNet” at minimal cost

• Can impose a tremendous amount damage and


confusion on a global scale.
• Reliant on technology, even minor attacks can be catastrophic
and debilitating
What is Cyber-Warfare

• 5th Dimension of War

• Probing or penetration attack

• On an individual computer or a computer


network system through the Internet

• Exploit weakness, steal information, or conduct


sabotage.
Who is the Enemy

• Individual Hackers

• Hacktivist Groups

• Criminal Organizations

• Corrupt Businesses

• Terrorists

• Foreign Military or Government


Types of Threat
• External: Most Likely

• Insider Threats: (Difficult to Identify)


• Malicious / Intentional / Unintentional / Consequential
Types of Attack

• Point of Sale Attacks: 28.5%

• Crimeware: 18.8%

• Computer Espionage: 18.0%

• Privilege Misuse: 10.6%

• Web Applications: 9.4%

• Miscellaneous: 14.7%
SOURCE: Verizon Data Breach Investigations Report (DBIR) 2015
Cyber-Targets
2015 # Breaches / # Records
• Medical / Healthcare - 129 / 100 Mil

• Government / Military - 27 / 47 Mil

• Education / Research - 31 / 724K

• Banking / Financial - 39 / 408K

• Small, Medium, Large Business - 154 / 121K

• Energy / Utilities - 79 /
Previous Attacks
• 2007: Russia / Estonia - DDOS - Sabotage

• 2010: U.S. / Iran - Stuxnet Worm- Sabotage


• 2013: Iran / U.S - Natanz - Retaliation - Theft / Fraud
Recent Attacks
• 2014: Anthem / Unknown
• Theft 80 mil medical records

• 2015: China / U.S - OPM - Theft


• Outsourced Domain Administration Support to Foreigners:
• System Administrators from: China and Argentina
• Both had ROOT Privileges.
• NO HACKING REQUIRED!
• Encryption Would NOT have helped!
Economic Impact
• Cost of Cyber-Crime

• Lost profits

• Minimal public spending due to lost trust

• Destruction of the Financial System


Cyber-Law

• Domestic Law

• International Law

• Laws of War

• Rules of Engagement - Kinetic / Electronic


Take Away
• Increase cyber education and training

• Increase budgets and funding

• Increase vigilance
Questions

You might also like