Nuevo Escenario De Confrontación, El

Total Page:16

File Type:pdf, Size:1020Kb

Nuevo Escenario De Confrontación, El CENTRO SUPERIOR DE ESTUDIOS DE LA DEFENSA NACIONAL MONOGRAFÍAS del 126 CESEDEN EL CIBERESPACIO. NUEVO ESCENARIO DE CONFRONTACIÓN Febrero, 2012 CATÁLOGO GENERAL DE PUBLICACIONES OFICIALES http://publicacionesoficiales.boe.es/ Edita: MINISTERIO SECRETARÍA DE DEFENSA GENERAL TÉCNICA NIPO: 083-12-024-7 (edición en papel) NIPO: 083-12-025-2 (edición en línea) NIPO: 083-12-023-1 (libro-e) ISBN papel: 978-84-9781-723-3 ISBN libro-e : 978-84-9781-724-0 Depósito Legal: M-12287-2012 Imprime: Imprenta del Ministerio de Defensa Tirada: 500 ejemplares Fecha de edición: marzo, 2012 En esta edición se ha utilizado papel libre de cloro obtenido a partir de bosques gestionados de forma sostenible certificada. Las opiniones emitidas en esta publicación son de exclusiva responsabilidad de los autores de la misma. EL CIBERESPACIO. NUEVO ESCENARIO DE CONFRONTACIÓN SUMARIO Página INTRODUCCIÓN .............................................................................. 9 Por José Ramón Casar Corredera Capítulo primero LA CIBERSEGURIDAD Y LA CIBERDEFENSA ................................ 35 Por Luis Feliu Ortega Capítulo segundo ESTRATEGIAS INTERNACIONALES PARA EL CIBERESPACIO ..... 71 Por Carlos Enríquez González Capítulo tercero LA EVALUACIÓN DEL CONFLICTO HACIA UN NUEVO ESCENA- RIO BÉLICO ................................................................................. 117 Por Javier López de Turiso y Sánchez Capítulo cuarto EL CIBERESPACIO COMO ESCENARIO DEL CONFLICTO. IDEN- TIFICACIÓN DE LAS AMENAZAS ................................................ 167 Por Ángel Gómez de Ágreda — 7 — Página Capítulo quinto CAPACIDADES PARA LA DEFENSA EN EL CIBERESPACIO ......... 205 Por Óscar Pastor Acosta Capítulo sexto TECNOLOGÍAS PARA LA DEFENSA EN EL CIBERESPACIO ......... 253 Por Manuel Pérez Cortés COMPOSICIÓN DEL GRUPO DE TRABAJO ................................... 307 ÍNDICE .............................................................................................. 309 — 8 — INTRODUCCIÓN INTRODUCCIÓN Por JOSÉ RAMÓN CASAR CORREDERA «Ne Sero Veniam Depugto Proelio» («Que no llegue tarde, con la batalla ya acabada») PLAUTO, Menaechmi El ciberespacio, nuevo Global Common junto con los tradicionales terres­ tre, marítimo, aéreo y espacial, está siendo objeto común de reflexión y publicación por parte de estudiosos y numerosas agencias e instituciones públicas y privadas nacionales e internacionales, incluyendo la Organiza­ ción del Tratado del Atlántico Norte (OTAN), Unión Europea, Organización para la Seguridad y Cooperación en Europa (OSCE), etc. El ciberespacio se anticipa o se vislumbra, desde la perspectiva que interesa a esta Mono- grafía, como un escenario de conflicto mayor, en el que las actuales esca­ ramuzas, mayoritariamente aún de baja intensidad, pudieran evolucionar a enfrentamientos de mayores dimensiones, que posiblemente combinados con otras actuaciones de fuerza, quizás en otros Commons, constituyan una verdadera guerra, la que ha dado en llamarse ciberguerra. Esta Monografía se orienta principalmente hacia aspectos relacionados con la ciberdefensa considerada como una cuestión básicamente militar, en el sentido de que se interesa por facetas que involucran a institu­ ciones, organizaciones o profesiones militares, en todo o en parte. No considera sin embargo, al menos explícita y detalladamente, otros aspec­ tos también importantes para el ciudadano, como el robo de datos per­ sonales, el ciberdelito económico, etc., y otros, seguramente de interés — 11 — nacional general, como el ciberespionaje industrial o el uso malicioso de otras herramientas «corrientes» de Internet, como redes sociales, blogs o simples portales web (o medios de comunicación on-line) para hacer apología extremista o sembrar dudas de confianza o reputación de una economía, una nación, una empresa, etc. Los ejemplos recientes (diarios) de ataques premeditados en Internet con notable impacto mediático (por ejemplo, los muy recientes casos de los grupos Anonymous o Lulzsec), aunque con pocas consecuencias realmente graves (conocidas, al menos de momento), parecen poner de manifiesto que, en muchos casos, el impacto mediático y la alarma social no son siempre proporcionales al grado de la amenaza real. Es literal­ mente imposible hacer una historia detallada, día a día, de la cantidad de sucesos de ataques (de baja intensidad, diríamos), consistentes en robos de datos, denegaciones de servicio, publicación dolosa de informacio­ nes estrictamente personales, etc. que se han sucedido en los últimos (muchos) meses: Sony, Honda, Citigroup, Paypal, Apple, The Sun, Face­ book, el Fondo Monetario Internacional, el Senado de Estados Unidos, la Agencia Central de Inteligencia (CIA) norteamericana, El Pentágono, Inteco, Movistar, y un larguísimo etcétera, que ocuparía varios párrafos, han sido víctimas de ataques a través de Internet. Al margen de conse­ cuencias prácticas que no se han producido, es indiscutible que estos ataques, sean de hacktivismo simple o de otra dimensión, son capaces de generar una sensación de indeseables inseguridad y desconcierto tanto en los ciudadanos como en las economías. El ciberespionaje comercial e industrial es también un elemento de preo­ cupación general, principalmente en Occidente, en relación a algunas grandes potencias. En el año 2010 salieron a la opinión pública varias campañas, aparentemente originadas en algún lugar de China. Quizás dos de las más conocida son la operación Aurora, dirigida a diversas empresas con sede en California de los sectores de la Tecnología de la Información y las Comunicaciones (TIC) y Química y la Shadow Network, aparentemente dirigida a comprometer determinados intereses de la In­ dia. El ataque a Lockheed Martin y a otros contratistas de Defensa de Es­ tados Unidos, a través de determinados dispositivos de Rivest Sharmia and Adleman, es otro ejemplo, de entre tantos, de intentos de intrusión interesada en sistemas de proveedores críticos para la defensa o la eco­ nomía de una nación. El 4 de noviembre de 2011 se conocía en la prensa española uno de los informes oficiales de inteligencia de Estados Unidos — 12 — (referido al periodo 2009­2011), que acusaba a China y Rusia de robar (o intentarlo) secretos comerciales. El informe, no obstante, reconoce la dificultad de determinar exactamente quién está detrás de estos ataques cibernéticos (por cierto, una de las dificultades recurrentemente aludidas en varios capítulos de esta Monografía). Se puede tener la tentación de intentar restar seriedad práctica a estos intentos, logrados o malogrados, de robo de datos (yo mismo la tengo), pero hay otros indicios y noticias que no pueden dejarnos tranquilos. Podríamos mencionar varios, sin duda; pero, para esta Introducción he retenido dos, basados en dos noticias recientes: la primera, conocida hace unos días, aunque referida a hechos sucedidos en los años 2007 y 2008, descubre que un informe del Congreso de Estados Unidos expone los indicios que hacen sospechar que desde China se tuvo acceso a dos satélites gestionados por la Administración Nacional de Aeronáutica de Estados Unidos (NASA). Se supone que el acceso tuvo lugar a través de un centro de control terrestre de la NASA en Noruega. Sin consecuencia práctica, el suce­ so ilustra que es posible imaginar capacidades de intrusión en misiones de alto valor estratégico. La segunda noticia es de ayer (escribo estas líneas el 20 de noviembre de 2011) y refiere un ciberataque contra una infraestructura industrial civil de Estados Unidos, en concreto, un servicio de distribución de aguas en Illinois. El incidente habría tenido lugar el 8 de noviembre; los atacantes habrían usado unas claves robadas de una empresa que desarrolla software para los Sistemas de Control SCADA, para acceder remotamente e inutilizar una (o varias) bombas de agua. No se sabe a día de hoy acerca de las intenciones del atacante, en su caso, y modo de actuación, pero el incidente demuestra la posibilidad de intervenir remota y maliciosamente en las infraestructuras críticas de un país. Se trazó el ordenador de origen del ataque en Rusia, pero esto, en el ciberespacio, no se puede constituir en prueba alguna de autoría real. Es en este contexto de intrusiones, ataques y provocaciones de menor o mayor envergadura, que se vienen sucediendo cotidianamente, en el que hay que entender la creciente preocupación intelectual, pero también la actualidad del tema en las agendas políticas y de trabajo de los organis­ mos competentes. El Centro Superior de Estudios de la Defensa Nacional (CESEDEN), im­ pulsando ésta que es una de sus líneas de reflexión prioritarias en la ac­ — 13 — tualidad, ha querido contribuir en el debate sobre el estado actual y es­ trategias de actuación para la defensa de los intereses de los individuos en el ciberespacio, formando un grupo de trabajo sobre el ciberespacio como nuevo escenario de conflicto, que me ha cabido el privilegio de coordinar. Se suma así a otras iniciativas concurrentes o complementa­ rias, algunas extremadamente valiosas, como la que recoge el Cuaderno de Estrategia, número 149 del Instituto Español de Estudios Estratégicos, febrero de 2011, dedicada también a la ciberseguridad. El grupo de trabajo ha estado formado por Luis Feliu Ortega, Carlos En­ ríquez González, Javier López de Turiso y Sánchez, Óscar Pastor Acos­ ta, Manuel Pérez Cortés, Ángel Gómez de Ágreda (que ha ejercido de secretario­coordinador con una eficacia imposible de imitar y sin cuyo concurso este trabajo no se hubiera terminado ni en tiempo ni en forma) y por mí mismo. Hemos dado
Recommended publications
  • A Roadmap for Cybersecurity Research
    A Roadmap for Cybersecurity Research November 2009 Contents Executive Summary ................................................................................................................................................iii Introduction ..............................................................................................................................................................v Acknowledgements .................................................................................................................................................ix Current Hard Problems in INFOSEC Research 1. Scalable Trustworthy Systems ...................................................................................................................1 2. Enterprise-Level Metrics (ELMs) ..........................................................................................................13 3. System Evaluation Life Cycle ...................................................................................................................22 4. Combatting Insider Threats ....................................................................................................................29 5. Combatting Malware and Botnets ..........................................................................................................38 6. Global-Scale Identity Management ........................................................................................................50 7. Survivability of Time-Critical Systems ..................................................................................................57
    [Show full text]
  • KPMG Report A4
    + = TAKING SECURITY TESTING TO THE NEXT LEVEL 5 MAY 2014 STAN HEGT HAVE YOU EVER ENCOUNTERED AN ADVERSARY THAT RAN NESSUS FROM A MEETING ROOM? PENETRATION TESTING vs RED TEAMING Penetration Testing Red Teaming Gain oversight of vulnerabilities Goal Test resilience against real attacks Predefined subset Scope Realistic access paths Focus on preventive controls Tested controls Focus on detection and response Focus on efficiency Test method Focus on realistic simulation Mapping, scanning, exploiting Test techniques Attacker TTPs Very limited Post-exploitation Extensive focus on crown jewels Part of development lifecycle Positioning Periodical exercise RED TEAMING – THE APPROACH The Red Team . Uses the same Tactics, Techniques and Procedures (TTPs) as real adversaries . Red team members must be on top of threat intelligence . Team members must have operational versatility The Blue Team . Is not only the security team (but also users, IT, management) . Does not know if an incident is real or triggered by a red team . Measure improvement: mean time to detect (MTTD) and mean time to recovery (MTTR) THE APPROACH – CYBER KILL CHAIN METHODOLOGY Transmission of the Select targets and attack via physical, Install “malware” to Complete actions and determine attack email, web, or social gain remote control achieve the red flags methods engineering Before the Hack T-1 T0 After the Hack T+1 Recon Weaponize Deliver Exploit Install Control Execute Establish command & Develop the attack Successful penetration control throughout the methods – access gained network Developed by Lockheed Martin, Intelligence-Driven Computer Network Defense THE ASSUME COMPROMISE MODEL Recon Weaponize Deliver Exploit Install Control Execute Focus on last steps in Kill Chain .
    [Show full text]
  • ASD-Covert-Foreign-Money.Pdf
    overt C Foreign Covert Money Financial loopholes exploited by AUGUST 2020 authoritarians to fund political interference in democracies AUTHORS: Josh Rudolph and Thomas Morley © 2020 The Alliance for Securing Democracy Please direct inquiries to The Alliance for Securing Democracy at The German Marshall Fund of the United States 1700 18th Street, NW Washington, DC 20009 T 1 202 683 2650 E [email protected] This publication can be downloaded for free at https://securingdemocracy.gmfus.org/covert-foreign-money/. The views expressed in GMF publications and commentary are the views of the authors alone. Cover and map design: Kenny Nguyen Formatting design: Rachael Worthington Alliance for Securing Democracy The Alliance for Securing Democracy (ASD), a bipartisan initiative housed at the German Marshall Fund of the United States, develops comprehensive strategies to deter, defend against, and raise the costs on authoritarian efforts to undermine and interfere in democratic institutions. ASD brings together experts on disinformation, malign finance, emerging technologies, elections integrity, economic coercion, and cybersecurity, as well as regional experts, to collaborate across traditional stovepipes and develop cross-cutting frame- works. Authors Josh Rudolph Fellow for Malign Finance Thomas Morley Research Assistant Contents Executive Summary �������������������������������������������������������������������������������������������������������������������� 1 Introduction and Methodology ��������������������������������������������������������������������������������������������������
    [Show full text]
  • Inside a Hacker's Mind
    1 © MazeBolt Technologies. All Rights Reserved. 2 Table of Contents Introduction 3 The Evolving Hacker Community 4 What motivates Hackers 4 Modus Operandi of DDoS Hackers 5 Best Practices to Mitigate DDoS Attacks: 8 Summary: Beating Hackers at their Own Game 8 References 9 Table of Figures Figure 1 – Anonymous Hackers Mask _______________________________________________________________ 3 Figure 2 - A Tweet by the Anonymous Group ________________________________________________________ 4 Figure 3 - Another Tweet by Anonymous ____________________________________________________________ 5 Index of Tables Table 1 - Cost of DDoS Services on the Dark Net ________________________________________________________________ 6 © MazeBolt Technologies. All Rights Reserved. 3 Introduction It was in 1974 that the first DDoS attack was launched when David Dennis—a 13-year-old learned about a new command that could be run on CERL’s PLATO terminals. Called “external” or “ext,” the command could cause the terminal to lock up—requiring a shutdown and power- on to regain functionality. He tested his knowledge which forced several users to power off simultaneously. In the 45 years since its inception, this form of attack has gained the status of the most persistent and damaging of all cyber-attacks. The next milestone in DDoS attacks occurred in August 1999, when a hacker used a tool called `Trinoo’ or `Trin00’, to disable the University of Minnesota’s computer network for more than two days. Trinoo is one of the first publicly available DDoS programs and a ground-setter for other widely available DDoS tools that would emerge in the future. Using a compromised host, the attacker executes automated processes to make a list of vulnerable machines.
    [Show full text]
  • Comptia® Security+ SY0-601 Cert Guide
    CompTIA® Security+ SY0-601 Cert Guide Omar Santos Ron Taylor Joseph Mlodzianowski A01_Santos_Fm_pi-plii_1.indd 1 01/06/21 2:49 pm CompTIA® Security+ SY0-601 Cert Guide Editor-in-Chief Copyright © 2022 by Pearson Education, Inc. Mark Taub All rights reserved. No part of this book shall be reproduced, stored in Product Line Manager a retrieval system, or transmitted by any means, electronic, mechanical, Brett Bartow photocopying, recording, or otherwise, without written permission from the publisher. No patent liability is assumed with respect to the use of the Executive Editor information contained herein. Although every precaution has been taken in Nancy Davis the preparation of this book, the publisher and author assume no respon- Development Editor sibility for errors or omissions. Nor is any liability assumed for damages Christopher A. Cleveland resulting from the use of the information contained herein. ISBN-13: 978-0-13-677031-2 Managing Editor ISBN-10: 0-13-677031-2 Sandra Schroeder Library of Congress Control Number: 2021935686 Senior Project Editor ScoutAutomatedPrintCode Tonya Simpson Copy Editor Trademarks Chuck Hutchinson All terms mentioned in this book that are known to be trademarks or ser- vice marks have been appropriately capitalized. Pearson IT Certification Indexer cannot attest to the accuracy of this information. Use of a term in this book Erika Millen should not be regarded as affecting the validity of any trademark or service mark. Proofreader Abigail Manheim Warning and Disclaimer Technical Editor Every effort has been made to make this book as complete and as accurate Chris Crayton as possible, but no warranty or fitness is implied.
    [Show full text]
  • Cyber Dissuasion
    N° 03/2012 recherches & documents mars 2012 Cyber Dissuasion Bruno gruselle Maître de recherche à la Fondation pour la Recherche Stratégique Bruno tertrais Maître de recherche à la Fondation pour la Recherche Stratégique alain esterle Chercheur associé à la Fondation pour la Recherche Stratégique w w w . frstrategie . o r g CYBER DISSUASION RECHERCHES & DOCUMENTS N ° 03/2012 Édité et diffusé par la Fondation pour la Recherche Stratégique 4 bis rue des Pâtures – 75016 PARIS ISSN : 1966-5156 ISBN : 978-2-911101-68-7 EAN : 9782911101687 WWW.FRSTRATEGIE.ORG 4 B I S RUE DES P ÂTURES 75 016 P ARIS TÉL. 01 43 13 77 77 FAX 0 1 43 13 77 78 SIRET 394 095 533 00045 TVA FR74 394 095 533 CODE APE 7220Z FONDATION RECONNUE D'UTILITÉ PUBLIQUE – DÉCRET DU 26 FÉVRIER 1993 SOMMAIRE INTRODUCTION ....................................................................................................................... 5 LES VULNERABILITES DE L’ESPACE NUMERIQUE ET LES RISQUES ASSOCIES SONT DEJA IMPORTANTS ET DEVRAIENT S ’AGGRAVER A L ’HORIZON 2020 ................................................... 9 Il est nécessaire d’établir le degré de gravité des risques numériques, les vulnérabilités exploitables et les perspectives de leur développement ................. 9 Les menaces pesant sur l’espace numérique ont d’ores et déjà des conséquences de sécurité importantes ...........................................................10 Les acteurs malveillants de l’espace numérique sont nombreux et leurs motivations appartiennent à des ensembles diversifiés ........................................14
    [Show full text]
  • Specialized Cyber Red Team Responsive Computer Network Operations
    TALLINN UNIVERSITY OF TECHNOLOGY DOCTORAL THESIS 25/2019 Specialized Cyber Red Team Responsive Computer Network Operations BERNHARDS BLUMBERGS TALLINNUNIVERSITYOFTECHNOLOGY SchoolofInformationTechnologies DepartmentofSoftwareScience ThedissertationwasacceptedforthedefenceofthedegreeofDoctorofPhilosophy(cyber security)on2ndofApril,2019 Supervisor: Dr. Rain Ottis, Department of Software Science, School of Information Technologies, Tallinn University of Technology Tallinn, Estonia Co-supervisor: Dr. Risto Vaarandi Department of Software Science, School of Information Technologies, Tallinn University of Technology Tallinn, Estonia Opponents: Professor Dr. Hiroki Takakura, National Institute of Informatics, Tokyo, Japan Fregattenkapitän PD Dr. Dr. habil. Robert Koch, Bundeswehr University of Munich, Munich, Germany Defence of the thesis: 27th of May, 2019, Tallinn Declaration: Hereby I declare that this doctoral thesis, my original investigation and achievement, submitted for the doctoral degree at Tallinn University of Technology, has not been submittedforanyacademicdegreeelsewhere. Bernhards Blumbergs signature Copyright: Bernhards Blumbergs, 2019 ISSN 2585-6898 (publication) ISBN 978-9949-83-413-6 (publication) ISSN 2585-6901 (PDF) ISBN 978-9949-83-414-3 (PDF) TALLINNA TEHNIKAÜLIKOOL DOKTORITÖÖ 25/2019 Vastutegevusele orienteeritud punase meeskonna küberoperatsioonid BERNHARDS BLUMBERGS Contents LIST OF PUBLICATIONS 7 AUTHOR’S CONTRIBUTIONS TO THE PUBLICATIONS 8 LIST OF ACRONYMS 10 LIST OF FIGURES 11 LIST OF TABLES 12 1 INTRODUCTION 15
    [Show full text]
  • Connected, More at Risk Addressing Cybersecurity Concerns for Tribal Organizations
    1/7/2019 More Connected, More at Risk Addressing Cybersecurity Concerns for Tribal Organizations January 10, 2019 To Receive CPE Credit › Individuals • Participate in entire webinar • Answer polls when they are provided › Groups • Group leader is the person who registered & logged on to the webinar • Answer polls when they are provided • Complete group attendance form • Group leader sign bottom of form • Submit group attendance form to [email protected] within 24 hours of webinar › If all eligibility requirements are met, each participant will be emailed their CPE certificate within 15 business days of webinar 1 1/7/2019 Presenter Rex Johnson Director [email protected] Introductions Rex Johnson, CISSP®, CISA®, CIPT, PMP®, PCIP™ Director Health Care, Financial Services, Not-for-Profit, Government, Education, Telecommunications & Manufacturing Industries 2 1/7/2019 Breaches Are Continuing … Reported Breaches by Year 1579 2017 totals: • 1,579 breaches total 1600 • 178,955,069 records exposed 1400 1091 1200 2018 update through Dec. 5, 2018: • 1,138 breaches 1000 783 780 614 • 561,782,485 records 800 471 421 600 400 200 0 2011 2012 2013 2014 2015 2016 2017 Source: ID Theft Center https://www.idtheftcenter.org 2018 – Data Breach Category Y-T-D Summary (12/5/2018) Incident vs. Breaches Incident Breach › Security event that › Incident that results in compromises integrity, the confirmed confidentiality or disclosure—not just availability of an potential exposure—of information asset data to an unauthorized party Source: Verizon 2018 Data Breach Investigations Report 3 1/7/2019 Breaches Are Costing More & More Average cost per Likelihood of a Average total cost Companies that lost or stolen recurring breach of a data breach record within two years contained a breach in $3.86 million $148 27.9% less than 30 days saved more than $1 Up from $3.62 million 2017 was $141 27.7% last year million vs.
    [Show full text]
  • The Question of State Sponsored Cyber Terrorism and Espionage Student Officer
    st th The Hague International Model United Nations Qatar 2020 | 21 ​ – 24 ​ of January 2020 ​ ​ ​ ​ ​ Forum: The Security Council Issue: The Question of State sponsored cyber terrorism and espionage Student Officer: Sebastian Santoni Position: President Introduction On the 27th of April 2007, Estonia experienced the first of a series of cyber attacks which would go on to shape laws, policies, and attitudes within and outside its borders. The country was bombarded by thousands of independent actors, resulting in the complete loss of most internet services for three weeks. The Estonian parliament, banks and media were all targeted in the midst of political disagreements with Russia. Although not the first incident of cyber terrorism, this was definitely one of the most destructive, managing to make an entire country go offline. In response, the world’s first ever regulations concerning actions in cyberspace were drafted, hoping to prevent such incidents from occurring in the future. However, incidents of cyber terrorism and espionage continued and remain a major threat to international security. Not only can they create mistrust and paranoia between nations, but also paralyse the organizations and resources core to their economic, social and political stability. This is especially true when such acts are initiated by countries and their related bodies, placing the world’s most sophisticated technology in the wrong hands. As members of the United Nations, it is the responsibility of countries to use their resources, voices and cooperation to strengthen international cyber security and work towards a world where state-sponsored cyber terrorism and espionage are void. Organizations such as the Kaspersky Lab and the Cooperative Cyber Defence Center of Excellence have made strides toward combating the issue, although they are restricted by an acute lack of relevant treaties and laws.
    [Show full text]
  • Red Team Analysis of Information Security Measures and Response
    International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 Red Team Analysis of Information Security Measures and Response Khushboo Amin1, Dr. Priyanka Sharma2 1 Student, School of Information Technology & Cyber Security, Raksha Shakti University, Gujarat, India 2Dean, Research & Development, Raksha Shakti University, Gujarat, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - This research attempts to develop a factor As we all know today, the cybersecurity threat landscape understanding of Red Team assessment strategies in computer may be a dynamic one and is continually changing. The cyber and data security. The Red Team is a 'cultured form' of attacker of today uses a combination of both traditional and assessment that identifies weaknesses during a quite advanced hacking techniques. On top of this, new variants of information and security system. This research aims to identify the existing malicious threat actors are seen daily. Red and define the form of dimensions of the Red Team's Teaming may be a full-scope, multi-layered attack simulation effectiveness from the customer, management, individual, and designed to live how well a company's people and networks, team member to strengthen the knowledge system's security applications and physical security controls can withstand an and performance. The Red Team generally addresses the attack
    [Show full text]
  • Principles of Cyberwarfare
    Cyberwarfare Principles of Cyberwarfare Cyberwarfare is different from classic kinetic warfare and therefore requires a review of basic warfare principles to differentiate it from armed conflict in the traditional sense. RAYMOND lassic, kinetic warfare principles have been not an exhaus- C. PARKS derived from thousands of years of expe- tive list, nor is it AND DAVID rience as Tsun Tzu, Carl von Clausewitz, intended as the P. DUGGAN Antoine-Henri Jomini, Basil Henry Liddel- final definitive Sandia CHart, and others have documented. Some kinetic one. Instead, these principles are a continuation of the National warfare principles apply to cyberwarfare, others have discussion with the cyberwarfare community that we Laboratories no meaning in cyberwarfare, and a few may actually began with our first article. We chose principles from be antagonistic to cyberwarfare. practical experience. When we follow these princi- The principles of warfare guide warfighting at the ples, we win; when we do not follow them, we lose. strategic, operational, and tactical levels. They’re the enduring bedrock of US military doctrine, derived Definitions from practical experience and the wisdom of those To present our cyberwarfare principles, we must define who documented that experience. Those who fol- our terms. Dan Kuehl defines cyberspace as “an opera- lowed these principles have won, and those who did tional domain whose distinctive and unique character is not have lost. Clearly, we do not have thousands of framed by the use of electronics and the electro magnetic years of experience in cyberwarfare, so we have to spectrum to create, store, modify, exchange and ex- start with what we have had.
    [Show full text]
  • Purveying Fake News
    1 GOVERNANCE IN AN EMERGING NEW WORLD Convened by George P. Shultz with James Cunningham, David Fedor, and James Timbie Table of Contents FALL SERIES, ISSUE 318 Introduction ..........................................................................................................................................................................5 What Is to Be Done? Safeguarding Democratic Governance in the Age of Network Platforms Niall Ferguson ................................................................................................................................................................................................8 Protecting Democracy in an Era of Cyber Information War Joseph S. Nye ..............................................................................................................................................................................................37 Observations from the Roundtable ................................................................................................................................. 47 GOVERNANCE IN AN EMERGING NEW WORLD The Information Challenge to Democracy A Letter from the Conveners Sharp changes are afoot throughout the globe. Demographics are shifting, technology is advancing at unprecedented rates, and these changes are being felt everywhere. How should we develop strategies to deal with this emerging new world? We can begin by understanding it. First, there is the changing composition of the world population, which will have a profound impact on societies. Developed
    [Show full text]