29.07.2016 Views

Cyber Primer

AEWhbF

AEWhbF

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Cyber</strong> threats<br />

• gain publicity by attacking public and private sector websites and<br />

online services; and<br />

• exploit social media to further their cause.<br />

The attacks against Georgian and Western websites on the outbreak of the<br />

Russian military incursion into Georgia is a good example of the damage that<br />

can be inflicted against a state by hacktivists. 27<br />

2.13. Insiders. Disgruntled or subverted employees may seek to<br />

deliberately exploit cyberspace to cause harm to their employer in a number<br />

of ways. Additionally, all personnel, regardless of their role or seniority,<br />

are on the front line in cyberspace and can, accidentally, give an adversary<br />

the ‘in’ they need to Defence systems by ignoring or circumventing cyber<br />

security advice and procedures. The Bradley Manning, Edward Snowden and<br />

Jeffrey Paul Delisle cases show the threat posed by insiders. 28<br />

2.14. Non-targeted threats. Although this chapter concentrates on<br />

targeted threats, there are numerous threats in cyberspace that are not<br />

specifically aimed at any one individual that could cause Defence harm.<br />

An example of a non-targeted threat is the Conficker virus, which caused<br />

significant disruption to the Ministry of Defence’s (MOD’s) information and<br />

communication technology (ICT) system. 29<br />

Characteristics of cyber attacks<br />

2.15. There are a number of cyber exploitation, attack tools and<br />

techniques freely available on the Internet. Adversaries traditionally employ<br />

four elements in an attack – vector, payload, behaviour and effect, all<br />

underpinned by intelligence.<br />

a. Vector. This describes the method and route an adversary uses<br />

to form initial contact with the target in cyberspace. This could be<br />

through an email, a link on a web page, removable media, wireless<br />

media or getting local access to the system used by the target.<br />

27 More details on this example can be found at Annex 2A on pages 42-43.<br />

28 More details on these examples can be found at Annex 2A on page 44.<br />

29 More details on this example can be found at Annex 2A on pages 46-47.<br />

26<br />

<strong>Cyber</strong> <strong>Primer</strong> (2nd Edition)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!