12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

INFORMATION ASSURANCE74. Time: Temporal elements of the other three dimensions need <strong>to</strong> be considered. The state ofinformation changes from one form <strong>to</strong> another in a system. Security services must adapt <strong>to</strong>a constantly changing environment as new software and new requirements are put in placewithin an organization. Likewise, countermeasures also need <strong>to</strong> be updated as the threat isdynamic—new malware and enemy tactics, techniques, and procedures (TTPs) areconstantly introduced.As this book is primarily about cyber warfare and not information assurance, we will focus onthe first two dimensions because they allude <strong>to</strong> offensive cyber warfare (more purely defensiveoperations tend <strong>to</strong> fall in<strong>to</strong> the realm of information assurance).The state of information is an important concept as it often dictates what type of TTPs anattacker may use when evaluating a target. As stated above, there are three such states: S<strong>to</strong>ragerefers <strong>to</strong> the state when the information is written <strong>to</strong> a disk. Transmission refers <strong>to</strong> the informationbeing transmitted across a network. Finally, processing refers <strong>to</strong> the information beingloaded in the temporary memory (RAM) of a computer. The state of the information becomesmost important in the second part of this book where we explore cyber espionage and exploitation.For example, in Chapter 10, we describe how Kata’ib Hezbollah (KH) was able <strong>to</strong> successfullysteal the video feeds of Preda<strong>to</strong>r drones. KH s<strong>to</strong>le this information while it was beingtransmitted from the drone <strong>to</strong> a ground station. By contrast, Operation Aurora, described inChapter 7, hackers, likely from China, s<strong>to</strong>le sensitive intellectual property from Google—pilfering it from file servers. The information in question was in the s<strong>to</strong>rage state.The second point listed above (security services) is discussed throughout the book. One ofthese services is availability. This crucial service ensures that users are able <strong>to</strong> access the informationthey seek. For instance, if a Web server is down, it is not available <strong>to</strong> provide information.Distributed denial of service (DDoS) attacks—as described in every case study in the firstpart of this book—target this specific security service as they are designed <strong>to</strong> bring down computersystems, thereby denying individuals access <strong>to</strong> the information contained in thosesystems.Another service informs about the authenticity of the data. If the data have integrity, a usercan be sure that a third party did not alter it. Many of the attacks seen in the first part of thisbook were designed <strong>to</strong> cause users <strong>to</strong> question data integrity—specifically, Web site defacementsof groups like Hamas (Chapter 4) and Anonymous (Chapter 6). In the second part ofthis book, the integrity of the data was violated by virtue of a third party obtaining unfetteredaccess <strong>to</strong> a target system. The break-in of the Tibetan Government-in-Exile (Chapter 7) and thecutting-edge malware known as Duqu (Chapter 8) come <strong>to</strong> mind. Integrity violations canaffect industrial equipment as well. We give examples in Chapter 11 where we describehow the integrity of the Maroochy water facility was compromised. In Chapter 13, wepresent how Stuxnet manipulated the hardware and software that controlled Iraniancentrifuges—hence, violating the overall integrity of the system.The next security service is authentication. We primarily see examples where authenticationis violated in Chapter 7 when we describe several case studies of cyber espionage attributed <strong>to</strong>Chinese hackers. Authentication was also a missing component in the unencrypted Preda<strong>to</strong>rdrone feeds that we will discuss in Chapter 10. Another role played by this security service isin industrial control systems—as many of these systems use pro<strong>to</strong>cols that rely on implicittrust relationships (Chapters 11–13).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!