+ All Categories
Home > Documents > Cyber Warfare Infrastructure

Cyber Warfare Infrastructure

Date post: 30-May-2018
Category:
Upload: christian-lowe
View: 230 times
Download: 4 times
Share this document with a friend

of 15

Transcript
  • 8/14/2019 Cyber Warfare Infrastructure

    1/15STRATEGIC

    BR

    IEFING

    by

    TheTechnolyticsInstitu

    te

    C

    yberWarfareInfras

    tructure

  • 8/14/2019 Cyber Warfare Infrastructure

    2/15STRATEGIC

    BR

    IEFING

    Conflict

    ThePrussianphilosopher

    KarlvonClau

    switz

    theorized:

    "Everyageh

    asitsownkin

    dofwar,itso

    wn

    limitingcond

    itionsanditsownpeculiar

    preconceptio

    ns."

    Weliveinan

    ageofinform

    ationfocused

    warfareCy

    berWarfare!

  • 8/14/2019 Cyber Warfare Infrastructure

    3/15STRATEGIC

    BR

    IEFING

    Intr

    oduction

    Cyberattacksandcyberespiona

    gearecostingbusinesses

    billionsofdollars

    ayearandhavenowbecomea

    National

    Securityissue!Nationalsecurity

    andcybersecurityexperts

    believetheU.S.

    Governmentanditscontractorsarethe

    targetsofagrow

    ingcyberwarfareeffortthatthey

    suspectis

    beingconducted

    bynationstates

    andtheirproxie

    swiththe

    aimofstealingm

    ilitaryandindus

    trialsecrets.Ithasbeen

    discoveredthathackersandvirusesinfiltratedDHS

    and

    DoDsystems,"e

    xfiltrating"orcopyingandsendin

    goutdata.

    Thisapproachs

    ignificantlyreduc

    estheexfiltrationofdata

    withoutdisruptin

    gintelligencega

    theringaboutthe

    cyber

    attackersandtheirtools.

  • 8/14/2019 Cyber Warfare Infrastructure

    4/15STRATEGIC

    BR

    IEFINGSettin

    gtheStage

    Governmentsus

    evastamountsofinformationtechnologyto

    conductoperatio

    nsandtointerfa

    cewithcitizens.

    Operations

    mustbeconductedsecurelyand

    withanassurancethat

    informationisac

    curateandprote

    ctedfromunauth

    orized

    accessanddisclosure.Governm

    entsmustalsoe

    nsurethe

    safetyandsecurityofitscitizens

    andthenation.

    Information

    technologycanaidinthisarea.T

    hisbriefingexam

    inesthe

    cyberwarfareinfrastructurethatsupportsthedefenseand

    intelligencesect

    ors.

  • 8/14/2019 Cyber Warfare Infrastructure

    5/15STRATEGIC

    BR

    IEFING

    DEF

    ENSE&INTELCO

    MMUNITY

    Surprisecyberattacker

    swithnovelcounter-me

    asures.

    Avoidstandardiz

    ationofcyb

    erdefenses

    .

    Developdiverseoverlap

    pingcyberdefensetechniques.

    ThoughtLeadership

  • 8/14/2019 Cyber Warfare Infrastructure

    6/15STRATEGIC

    BR

    IEFING

    W

    arning

    Animagefroma

    lQaeda'swebsitefeaturesa"cra

    cked"orbroken

    computer

    whichinourmindsindicatesapotentialcyberattack!

  • 8/14/2019 Cyber Warfare Infrastructure

    7/15STRATEGIC

    BR

    IEFING

    Bac

    kground

    Cyberwarfa

    reisbeingwa

    gedonamas

    sivescalethe

    world

    over.Ostensiblyfriendlyn

    ationsattackeachothers'e

    lectronic

    nervoussys

    temsfrequently,andwithre

    cklessabandon.

    Onasingle

    dayin2008,the

    Pentagonwashitbywould-beintruders6

    milliontime

    sina24-hourpe

    riod.

    In2007the

    Pentagonssystemswerehacked

    andreportedlybetween20

    and27tera

    bytesofdatawasstole.AlthoughChinawasblame

    dforthe

    attackviaindirectchannels,

    thereisnoconclu

    siveevidencethatthey

    werebehin

    dthebreach.

  • 8/14/2019 Cyber Warfare Infrastructure

    8/15STRATEGIC

    BR

    IEFING

    Bac

    kground

    TheUKMinistry

    ofDefense(MoD),theDoDequivalentin

    Britain,hasbeguntoinvestigate

    whathasbeenc

    alledthe

    mostsignificant

    cybersecuritybr

    eachafterinform

    ationand

    evidencesurfacesthatallemails

    sentfrommultip

    leRoyal

    AirForcestation

    sweresenttoIP

    addressestracedbackto

    Russia.

    Over24RAF

    basesand75%of

    RoyalNavyships

    were

    impacted.

    Outofthe24

    RAFstationsithit,

    somewererecentlyusedby

    theMoDtosc

    ramblefighterairc

    rafttoheadoffRussian

    bomberstestingBritishairdefen

    ses.

    Thissecurityevent

    resultedintheneed

    tobringdownsystem

    sandhaltemailcommunication

    acrossmos

    t,ifnotall,ofthemilitary.

  • 8/14/2019 Cyber Warfare Infrastructure

    9/15STRATEGIC

    BR

    IEFING

    UKunderAttack

    SecurityministerLordWesttoldtheHouseofLor

    dsthatthe

    UKcontinuesto

    betargetedbya

    "largenumbero

    fattacks"

    andthatthegov

    ernmentis"takin

    gaction"todealw

    iththose

    backedbyhostileregimes.Thegovernmenthas

    saiditis

    engagedintacklingongoingstate-sponsoredcyberattacks

    onUKnationalinfrastructure.

    LordWestrefusedtoconfirmthe

    natureororigin

    ofthese

    attacksbutsaid

    cybersecurityis

    a"verydangerousarea"

    andthattheUK

    hasbecome"mo

    revulnerableas

    we

    becomemoreconnected.

  • 8/14/2019 Cyber Warfare Infrastructure

    10/15STRATEGIC

    BR

    IEFING

    Transition

    CyberWea

    ponsEvolut

    ion

    LowHigh

    Basic

    Research

    Applied

    R

    esearch

    Early

    Adopters

    RapidAdvanceme

    nt

    1994

    19

    98

    2002

    2004

    2008

    2012

    2020

    BasicW

    eapons

    AdvancedWeapons

  • 8/14/2019 Cyber Warfare Infrastructure

    11/15STRATEGIC

    BR

    IEFING

    AdvancedW

    eaponsAna

    lysis

    Theseattacks

    weresophisticated.Thehybride

    xploithad

    severalfunctio

    nsandfeaturesincluding:

    Self-defending

    Rootlevelatta

    cks

    Morphingevery35seconds

    Phonehomeforinstructions

    Eachwormkn

    owsaboutotherworm

    s

    Programmedtoworkoffpeakopera

    tionalhours

    Turningoffco

    mputerdefensesandchangingsettings

    Leverageath

    reepartarchitecturelikethatofamissile.

    Implicationsofadvancedexplo

    its

    Controlling1millionhostscancauseenormousdamage

    DDoSAttack

    Stealingandm

    odifyingdata

    Canbelevera

    gedforcyber-warfare

    Conductspre-operationalsurveillance

    Wormscanbeusedtogainsuchco

    ntrolinaveryshortpe

    riodoftime.

  • 8/14/2019 Cyber Warfare Infrastructure

    12/15STRATEGIC

    BR

    IEFING

    Netw

    orkConnection

    CyberInfras

    tructureDia

    gram

    Alerts

    What

    When

    Who

    Where

    Why

    Tec

    hnical

    Profile

    Enemy

    Profile

    Basic

    Intermediate

    Ad

    vanced

    D

    ecision

    Support

    Dashboard

    Cyber

    Intelligence

    Cyber

    R

    econnaissance

    Cyber

    Countermeasu

    res

    O

    ffensiveCyber

    Weapons

    Cyber

    Command&

    Control

    Traditional

    Command&

    Control

    Cyber

    Analysis

    CyberWarfare

    Infrastructure

    Version:

    1.25

    Date:02/12/09

  • 8/14/2019 Cyber Warfare Infrastructure

    13/15STRATEGIC

    BR

    IEFING

    ClosingThought

    TheUnitedStat

    esmusttreatcybersecurityas

    oneofthemos

    timportant

    nationalsecurit

    ychallengesitfaces!Thisisa

    strategicissue

    onparwith

    weaponsofm

    assdestruction

    andglobaljiha

    d,wherethego

    vernment

    b

    earsprimaryre

    sponsibilityfor

    defendingournationscritical

    information

    infrastructure

    andinformatio

    nassets.

  • 8/14/2019 Cyber Warfare Infrastructure

    14/15STRATEGIC

    BR

    IEFING

    QUESTIONS&ANSWERS ?

    ?

    ?

    ?

    ?

    ?

    ?

    ?

    ?

    ?

    ?

    ?

    ?

    ? ?

    ?

    ?

    ?

    ?

    ?

    ?

    ?

    ?

    ?

    ?

    ?

    ?

    ?

    ?

    ?

    ?

    ?

    ?

    ?

    ?

    ?

    ?

    ?

    ?

    ?

    ?

  • 8/14/2019 Cyber Warfare Infrastructure

    15/15

    TRATEGIC

    BR

    IEFINGAboutT

    echnolytics

    vinG.Coleman

    7WashingtonRoad

    lStop#348

    Murray,PA15317

    888-650-0800

    12-818-7656

    412-260-2773

    kgcoleman@technolyticscom

    TheTechnolyticsIn

    stitute(Technolytics)wasestablishedin2000a

    sanindependent

    executivethink-tan

    k.Ourprimarypurpose

    istoundertakeoriginalresearchand

    developsubstantiv

    epointsofviewonstrategicissuesfacingexecutivesin

    businesses,governmentandindustryarou

    ndtheworld.

    Ourstrategicgoals

    focusonimprovingcriticalmeasuresofperform

    ance,creating

    sustainablecompe

    titiveadvantage,deliveringinnovationandtechnology,and

    managingsecurity

    andrisk.Weoperatethreecenters:[Business&

    Commerce]

    [Security&Intellige

    nce]and[Science&Te

    chnology]andserveclientinbusiness,

    governmentandin

    dustry.

    KevinG.Coleman

    isahighlyskilledexecu

    tive,managementcons

    ultantandcyber

    warfarestrategistw

    ithsignificantknowledg

    eandexperienceinmu

    ltipleindustries.He

    currentlyholdsanactivesecurityclearancewiththeDepartmentofDefenseandisa

    recognizedauthorityincomputersecurity,crimeandcyberterroris

    m.ACertified

    ManagementCons

    ultant(CMC),heisane

    xpertinthetechnology

    andcompliance

    areas.CMCisthe

    certificationmarksawar

    dedbytheInstituteofM

    anagement

    ConsultantsUSAa

    ndrepresentsevidence

    ofthehigheststandard

    sofconsultingand

    adherencetothee

    thicalcanonsoftheprofession.Fewerthan1%

    ofallconsultants

    haveachievedthis

    levelofexcellence.He

    hasexperienceinsecurityandcompliance

    withinmultipleindu

    striesincluding:hightechnology,financialservices,manufacturing,

    defense,retail/consumerproductsandene

    rgy.


Recommended