1/18
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Cybersecurity
defence of ‘computers + servers, mobile devices, electronic systems, networks + data from malicious attacks’
Cyber space
Artifacts based on or dependent on computing + communications tech; info that these use, store, handle, or process; + interconnections among these various elements’
Cyber domain
Electronic info (data) processing domain comprising of 1 or several info technology infrastructures
Cyber power
Ability to obtain preferred outcomes through use of electronically interconnected info resources of cyber domain
Types of attacks in cyberspace (4)
Cyber activity labelled as Computer network operations (CNO) or cyber operations - types:
Computer network attack (CNA)
Computer network defence (CND)
Computer network exploitation (CNE)
The attribution conundrum
Attribution = ability to hold a cyber actor responsible for a specific cyber operation or action
Efforts to develop norms and laws governing cyber activity (2)
Budapest Convention on Cybercrime -> 1st int treaty on crimes committed via Internet + other computer networks, dealing particularly w infringements of copyright, computer-related fraud, child pornography + violations of network security’
Tallinn Manual on Int Law Applicable to Cyber Operations (2013), aspirational: provides extremely detailed + thoughtful compilation of expert opinion on application of int law + norms to Cyber domain
Tallinn Manual on the International Law Applicable to Cyber Operations (2013) → Key elements (4)
Prohibition on use of force in int law is also applicable to cyber operations.
Basis as to whether a cyber operation rises to level of an act of war is if it causes harm to individuals or damage to property equivalent to a use of force.
Actual impact of cyber operation is critical; cyber operations that result in inconvenience + minor disruptions are not considered to be an act of war or use of force.
States are responsible for cyber attacks even if conducted by a non-state entity within their borders if state is aware of them or these groups act under their direction
Cyber attacks - 2 case studies
Estonia (2007)
North korea vs Sony (2014)
Estonia (2007) (8)
Estonian state inst weathering a sustained attack by a skilled cyber adversary
Difficulties in several areas
Classifying cyber attack as potential act of war
Attributing attacks by an adversary that publicly id as non-state hacktivist surrogate of Russian state
Estonia’s efforts to prepare for future attacks w defensive deterrence instead of cyber and/or physical response
Cyber campaign targeted websites of Estonia’s president, parliament, gov ministries + pol parties, as well as 2 of country’s largest banks + 3 of Estonia’s major media orgs
Initial attacks consisted largely of ‘ping-flooding’ (denial of service - DDOs) -> so knocked websites offline
Since attack Estonia has developed cyber defenses
North korea vs Sony (2014) (5)
Attack by North Korea against Sony Pictures Entertainment, US company
Gov began intense development of a cyber cadre, cyber warriors
Sony Pictures’ Entertainment computer system experienced an extensive + debilitating attack
Employees unable to use their computers, shut down entire system, searching for a way to resurrect its computer operations.
US gov placed sanctions on North Korea
Outer Space
NewSpace entrepreneurs mobilize (+ glamorize) language + logics of colonization, which has been responsible for global-scale violence, suffering + genocide on Earth
Outer space in int law (2)
UN outer space treaty defines outer space as a res communis: a global commons owned by ‘humanity’
Incl both negative duties (prohibitions against occupation or use by states) + positive duties (to use outer space for activities that benefit ‘all of mankind’)
Risks with space colonization (4)
Threats related to conflict (armed/otherwise) between states, threats to stability of int system + threats to physical security
Challenge -> concept of sovereignty / no body governing outer state
NewSpace projects might create significant insecurity for ppl who might eventually travel to space as miners, workers/colonizers
Space colonization projects may also entrench insecurities based on particular constructions of race + gender.
Ukraine’s IT army (3)
Since invasion of Russia Aushev met w Ukrainian Minister of Digital Transformation Mykhailo Fedorov to discuss possibility of assembling an army of volunteers that would help defend + secure Ukraine’s digital infrastructure
Created a telegram w over 3000000 volunteers
1st task to attack Russian banks, businesses + gov websites
Operations by Ukraine’s IT army (4)
Defaced russian websites to spread disinformation + show mistrust
Offensive campaign that breached RuTube (Russian youtube clone) + almost took it down
Sabotage of Russian Rossgrame (instagram clone)
Dumping of source codes + internal data of Russian company Right Line, which is developing govs Digital Ruble project
Problematic precedent of the IT army (2)
IT army asked to gather, train + direct ppl across globe to participate in DDos Campaigns against Russian civilian infrastructure
Trappings of legitimacy = unclear whether + how Amazon, Microsoft + Google are balancing risks between helping Ukrainian gov survive + allowing their services + infrastructure to be misused by IT Army
Problems with the IT army (3)
Members urged to use virtual private networks (VPNs) for attacks
Volunteers don't realize that if actively participate in cyber war, are automatically considered a combatant in that war
IT Army has officially partnered with IPStress.in – a boot stressor that maintains its own botnet to DDoS websites + is in essence a cyber-criminal enterprise
Direction of the IT army (3)
Likely to continue to push towards automatisation + gamification to mitigate loss of volunteers, + exploit a growing influx of highly skilled specialists
Positioned to become an advanced persistent threat
Worrying if it moves away from DDos towards more potentially disruptive attack vectors