2007 aurora test
play

2007 Aurora Test Cyberwarfare is generally state-on-state action - PowerPoint PPT Presentation

2007 Aurora Test Cyberwarfare is generally state-on-state action equivalent to an armed attack or use of force in cyberspace that may trigger a military response with a proportional kinetic use of force. Cyberterrorism can be considered


  1. 2007 Aurora Test

  2. • Cyberwarfare is generally state-on-state action equivalent to an armed attack or use of force in cyberspace that may trigger a military response with a proportional kinetic use of force. • Cyberterrorism can be considered “the premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives, or to intimidate any person in furtherance of such objectives.” • Cybercrime includes unauthorized network breaches and theft of intellectual property and other data; it can be financially motivated, and response is typically the jurisdiction of law enforcement agencies. • Cyberactivism is when individuals perform cyberattacks for pleasure, philosophical, political, or other nonmonetary reasons

  3. Saudi-Aramco 2012 • In August 2012 a series of cyberattacks were directed against Saudi Aramco, the world’s largest oil and gas producer. • The destructive attacks compromised 30,000 computers and the code was apparently designed to disrupt or halt oil production. • Numerous groups, some with links to nations with objectives counter to Saudi Arabia, have claimed credit for this incident.

  4. IEEE Spectrum, Feb 2013

  5. Russia v. Ukraine 2015-2016

  6. Destructive malware attacks == Cyberwar ? • WannaCry (2017) • $4B-$8B • NotPetya (2017) • $10B • Most devastating cyberattack (so far) • Ransomware (2018+) • Atlanta $10M Mike McQuade

  7. Full detail: https://csis-prod.s3.amazonaws.com/s3fs-public/ 190904_Significant_Cyber_Events_List.pdf CSIS Technology Policy Program | Source: CSIS & Hackmageddon

  8. Hackmageddon Statistics September 2020

  9. Smith’s proposed "Digital Geneva Convention" requirements 1. No targeting of tech companies, private sector, or critical infrastructure. 2. Assist private-sector e ff orts to detect, contain, respond to, and recover from events. 3. Report vulnerabilities to vendors rather than stockpile, sell, or exploit them. 4. Exercise restraint in developing cyberweapons and ensure that any developed are limited, precise, and not reusable. 5. Commit nonproliferation activities to cyberweapons. 6. Limit o ff ensive operations to avoid a mass event. Microsoft President Brad Smith's RSA 2017 Keynote

  10. Lawmakers worldwide want to "do something" They need to ensure any new policies/regulations are CREME - y : C ooperative – they work together, rather than interfere with each other R elevant – addressing a problem that really matters E nforceable – preventing violations or enabling detection and prosecution of violators M eaningful – addressing the identified problem in an e ff ective manner E mpowering – encouraging a culture of security

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend