12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

8 1. CYBER WARFARE: HERE AND NOWConfidentiality is a security service that ensures that the communication between twoparties is not “overheard” by others. This service primarily comes in<strong>to</strong> play in the second par<strong>to</strong>f this book on espionage and exploitation—particularly in Chapters 7 (Chinese-attributedespionage) and 9 (KH tapping in<strong>to</strong> Preda<strong>to</strong>r drone feeds).Finally, nonrepudiation refers <strong>to</strong> the assurance that the sender of the data is provided withproof of delivery and the receiver is provided with proof of the sender’s identity. 9 Perhaps thebest example of this service being violated is in Stuxnet’s man-in-the-middle (MITM) attackagainst Siemen’s Step 7 software (described in Chapter 13) where the user is issued a falsereport about the software uploaded <strong>to</strong> a controller card.Now with a basic understanding of what this book is attempting <strong>to</strong> study, we shall examineseveral case studies. First, we look at what constitutes perhaps the first cyber warfare event <strong>to</strong>really capture the imagination of the general public: the 2007 Russian cyber attacks againstEs<strong>to</strong>nia—possibly the first significant cyber assault in his<strong>to</strong>ry launched by one state againstanother.References1. On War, Indexed Edition, Carl von Clausewitz, translated by Michael Eliot Howard and Peter Paret. Prince<strong>to</strong>nUniversity Press, Prince<strong>to</strong>n NJ, 1989.2. Lewis JA. Assessing the risks of cyber terrorism, cyber war and other cyber threats, Washing<strong>to</strong>n, DC: Center forStrategic and International Studies; 2002. http://csis.org/files/media/csis/pubs/021101_risks_of_cyberterror.pdf.3. Ranum MJ. <strong>Cyber</strong>War: reality or hype? Vanguard security conference, 2004, Reno Nevada; 2004. http://www.ranum.com/security/computer_security/archives/myth-of-cyberwar.pdf.4. Ibid., Lewis.5. Ranum M. <strong>Cyber</strong>war, critical infrastructure protection. SearchSecurity. http://searchsecurity.techtarget.com/video/Marcus-Ranum-on-cyberwar-critical-infrastructure-protection; July 9, 2011 [accessed July 5, 2012].6. Johnson M, Meyeraan J. Military deception: hiding the real—showing the fake. Joint Forces Staff College. http://www.au.af.mil/au/awc/awcgate/ndu/deception.pdf; 2003.7. McCumber J. Information systems security: a comprehensive model. Proceedings of the 14th national computersecurity conference. Baltimore, MD: National Institute of Standards and Technology; Oc<strong>to</strong>ber 1991.8. Maconachy WV, Schou CD, Ragsdale D, Welch D. A model for information assurance: an integrated approach,Proceedings of the 2001 IEEE workshop on information assurance and Security United States Military Academy,West Point, NY; June 5–6, 2001.9. Ibid., Maconachy et al.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!