29.07.2016 Views

Cyber Primer

AEWhbF

AEWhbF

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Cyber</strong> threats<br />

2.7. Threat actors exploit cyberspace’s characteristics through innovative<br />

approaches that often have a low-entry cost and they are helped by the<br />

ease of access often presented to them. Such malevolent actors may seek to<br />

create uncertainty and mistrust through:<br />

• direct access to people and systems;<br />

• attacking and exploiting our national and economic infrastructures;<br />

and<br />

• attacking military capabilities including command and control<br />

systems, logistical support and personnel.<br />

2.8. Nation states. The most sophisticated threat is likely to come from<br />

established, capable states (or their proxies) who exploit cyberspace to<br />

gather intelligence on government, military, industrial and economic targets.<br />

Defence is particularly concerned when states:<br />

• seek intelligence about UK military plans;<br />

• steal intellectual property and intelligence on UK military<br />

capabilities;<br />

• exploit UK military capabilities using their military and intelligence<br />

services with knowledge of the vulnerabilities of our capabilities;<br />

• deny the UK use of its cyberspace communications channels;<br />

• conduct subversive activities using their intelligence services; and<br />

• use proxies or large numbers of synchronised and coordinated<br />

partisans to cover the true origin of their activities within<br />

cyberspace.<br />

The theft of personal data from the United States Office of Personnel<br />

Management shows the alleged use of cyber operations by a state. 23<br />

23 Details on this case study can be found at Annex 2A on pages 36-37.<br />

24<br />

<strong>Cyber</strong> <strong>Primer</strong> (2nd Edition)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!