Acknowledgement

Total Page:16

File Type:pdf, Size:1020Kb

Acknowledgement ACKNOWLEDGEMENT One might say acknowledgement reveals to the reader something about the personality behind the writer. As a poet suggests, an acknowledgements page acts as an alternate to the content page, a skeleton key to the literary world in which the writer aspires to. The enduring process of thesis writing has been a purposeful experience for professionally and personally. Writing thesis has given the smacking feeling, delivered with an open hand, to wake you up to eventually realize that after years of studying over assortment of courses, you actually have not comprehend anything comprehensively. It is with no doubt my highest gratitude goes to thank Allah SWT, the sole Almighty God who without His permission and decree nothing would be possible, and the Prophet Muhammad Sallahu Alaihi Wasallam, who always has my complete adoration. The indescribable feeling and journey towards developing extraordinary qualities of a human being will not be attained without others’ help, guidance, assistance and more importantly, existence. My indebtedness feeling upon thesis completion would not be actualized without the presence of these respective people: 1. Mr. Teuku Rezasyah and Mr. Makmur Widodo as the best thesis mentors, whom without their valuable time, enduring support, and persistent guidance, I would not be able to sustain this thesis writing. 2. Muzhadi and his significant other, Rosdiana Monoarfa. The thesis is solely dedicated to their persistent and continuous support, love, and encouragement. 3. Significant friends and partners. Zay, Puspa, Ayu, Meydi, Salim, Wibi, Brimoresa, Atin for our consistent togetherness, laughter, and happiness we bring to each others’ lives. Iskandar Shah, for putting up with me during ups and downs, for being my worst distraction, my rhythm, my blues. Jakarta January 20th 2014 THE UNITED STATES CYBERWARFARE STRATEGY TOWARDS IRAN THROUGH OPERATION OLYMPIC GAMES (2006-2013) By ANISSA SYIFA ADRIANA ID 016201000012 A thesis presented to the Faculty of International Relations, Communication, and Law President University In partial fulfillment of the requirements for Bachelor Degree in International Relations Major in Strategic and Defense Studies JANUARY 2014 DECLARATION OF ORIGINALITY I declare that this thesis entitled “The United States Foreign Policy towards Iran: Fulfilling Its National Objectives through Cyberwarfare Strategy Covered in Operation Olympic Games (2006-2013)” is, to the best of my knowledge and belief, an original piece of work that has not been submitted, either in whole or in part, to another university to obtain a degree. Jakarta, 19 January 2014 Anissa Syifa Adriana CHAPTER I INTRODUCTION 1.1. Background of the Study The pace of global change in international affairs has quickened dramatically during twenty first century. To comprehend thoroughly the fundamental paradigm one needs to fathom the substantial characteristic of International Relations. International Relations have always been dynamic and will continue to be so. The idea of interactions happenings amongst state-actors and non-state actors are complex and compounded. The interactions also follow with vast coherent and developed theories such as stability versus instability, mutual deterrence and balanced arms control, and ideally, national interest versus international security. As written by James E. Dougherty about international politics, “hundreds of actors are pouring into the international arena at the same time... The behavior of individual actors is purposive, but the process as a whole knows no purpose and no overall direction...”1 Power, strategy and foreign policy are some of many tools of a nation-state to pursue its national interests as well as to secure the viability of alliances under such strain. Foreign policy is widely considered as a strategy that a nation possesses in obtaining and securing national interest. Pattern of interactions within foreign policy 1 Andrew M. Scott, “The Logic of International Interaction,” International Studies Quarterly, 21(3) P 438 Retrieved 4 October 2013 1 are a set of processes by which decision makers in one national unit, interact with each other and respond to inputs from the domestic and international environment.2 The globally interconnected world where digital information as well as communications infrastructure known as “cyberspace” has affected the way the U.S. reassesses their current policies. Cyberspace practically touches everything. The nation’s digital infrastructure, which is largely based upon internet, has changed significantly due to the growing threats of cyber-crime operations. The idea of current digital revolution that U.S. and the world are facing has come to the realization that sensitive and confidential information is no longer secure. The unimaginable boundaries of cyberspace marks no edge or limit. United Nations (UN) defines cyberspace as the global system of systems of interconnected computers, communications infrastructures, online conferencing entities, databases, and information utilities generally known as Net.3 Meanwhile, the Department of Defense (DoD) defines cyberspace as the national environment in which digitized information is communicated over computer networks.4 Cyberspace has provided new battlefield for cyberwarfare. Critical cyber-infomation infrastructure and other national infrastructure are every nation’s greatest investment. Cyberwarfare is applicable to every nation-state. The Economist (2010) called cyberwarfare aggression in the “fifth domain”, other than sea; land; sea; air; and space, which many of nation-states start to realize, including the U.S. Another definition of cyberwarfare is symmetric or asymmetric offensive and defensive digital network activity by states or state-like actors, encompassing danger to critical national infrastructure and military systems. It requires a high degree of 2 James E. Dougherty. Robert L. Pfaltzgraff, Jr. "System, Structure, Agent, and International Relations Theory." Contending Theories of International Relations: A Comprehensive Survey. 5th ed. N.p.: Longman, 2001. p 105. Print. Retrieved 4 Oct 2013 3 Andress, Jason. Winterfeld, Steve. “Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners”. Elsevier 2011. p. 2 4 Joint Publication 3-13 Information Operations. Department of Defense. 13 Feb 2006 2 interdependence between digital networks and infrastructure on the part of the defender, and technological advances on the part of the attacker. It can be understood as a future threat rather than a present one, and fits neatly into the paradigm of Information Warfare. 5 Cyberwarfare is understood as the act of disruption to sabotage with motivation of hacking adversaries’ computer network. The motives are mostly based on political background, seen as the bloodless non-kinetic warfare yet cause similar destruction to critical infrastructure.6 The first major event that took everyone’s attention was the Estonian government cyberwarfare.7 The Estonian government was making a huge leapfrog from a paper-based government to a web-based infrastructure in conducting all the business. As the Estonian government was part of the North Atlantic Treaty Organization (NATO), they then went for help resolving the cyber-attack issue. Hence, Estonia has gone to be one of the leading nations in the arena of Cyber Strategy and the Cooperative Cyber Defense Center. There were plenty of speculations on the Soviet government as the attacker, noting the fact that Estonia was an outcry from Russian population. The next similar cyber-attack happened during the war in Georgia, over South Ossetia. Albeit South Ossetia had achieved its de facto independence from Georgia, international community still perceives South Ossetia as part of Georgia. Therefore, a peacekeeping force was sent to help Russia and Georgia to control the region. In 2008, Georgia moved forces into South Ossetia to quell the separatist movement. Russian then counterattacked to protect the South Ossetia citizens. In the following g weeks, Georgian government’s computer network was then received series of attacks 5 Shane M. Coughlan, “Is There a Common Understanding of What Constitutes Cyberwarfare?,” The University of Birmingham School of Politics and International Studies, 30 September 2003, p. 2. 66 Sanger, David E. (1 June 2012). "Obama Order Sped Up Wave of Cyberattacks Against Iran". The New York Times. Retrieved 1 June 2013 3 such as denial of service attacks against the government computer network where spamming email flooded the system. Many of intelligence officials consider cyberwarfare in the U.S. as a larger threat than terrorism.8 In 2010, the U.S. worked with Israel to launch cyber-attacks on Iran targeting Iran’s uranium enrichment plant, Natanz, using a worm known as Stuxnet. 9 This was believed by many as an ‘illegal’ attempt to hassle Iranian nuclear program. Stuxnet is considered to be the first-known worm designed to target real- world infrastructure such as power stations, water plants and industrial units. Stuxnet’s complexity was so superior that it was claimed by researchers to only have been written by a “nation-state”.10 Symantec, a Belarus-based security firm, stated that there have been more infections targeting Iran than anywhere else in the world.11 Stuxnet –code-named Olympic Games— had been initiated and designed to subtly sabotage Iran’s nuclear program in early 2006 during the George W. Bush administration. President George W. Bush approved $300m on joint covert projects aimed at
Recommended publications
  • 2016 8Th International Conference on Cyber Conflict: Cyber Power
    2016 8th International Conference on Cyber Conflict: Cyber Power N.Pissanidis, H.Rõigas, M.Veenendaal (Eds.) 31 MAY - 03 JUNE 2016, TALLINN, ESTONIA 2016 8TH International ConFerence on CYBER ConFlict: CYBER POWER Copyright © 2016 by NATO CCD COE Publications. All rights reserved. IEEE Catalog Number: CFP1626N-PRT ISBN (print): 978-9949-9544-8-3 ISBN (pdf): 978-9949-9544-9-0 CopyriGHT AND Reprint Permissions No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]). This restriction does not apply to making digital or hard copies of this publication for internal use within NATO, and for personal or educational use when for non-profit or non-commercial purposes, providing that copies bear this notice and a full citation on the first page as follows: [Article author(s)], [full article title] 2016 8th International Conference on Cyber Conflict: Cyber Power N.Pissanidis, H.Rõigas, M.Veenendaal (Eds.) 2016 © NATO CCD COE Publications PrinteD copies OF THIS PUBlication are availaBLE From: NATO CCD COE Publications Filtri tee 12, 10132 Tallinn, Estonia Phone: +372 717 6800 Fax: +372 717 6308 E-mail: [email protected] Web: www.ccdcoe.org Head of publishing: Jaanika Rannu Layout: Jaakko Matsalu LEGAL NOTICE: This publication contains opinions of the respective authors only. They do not necessarily reflect the policy or the opinion of NATO CCD COE, NATO, or any agency or any government.
    [Show full text]
  • 2017 National History Bowl National Championships Playoff Round 7
    2017 National History Bowl National Championships Playoff Round 7 Round: Playoffs 7 Supergroup Group Room: Reader: Scorekeep: Team Names, including letter designation if needed, go in the large boxes to the right. TU# Bonus Bonus Points Cumulative Score Bonus Points Cumulative Score 1 Quarter 1 2 Tossups Only 3 4 Put a "10" in the 5 column of the team 6 that answers correctly. 7 Otherwise leave box 8 blank. 9 10 1 Quarter 2 2 Tossups and bonuses 3 Put "10" in the team's 4 column. Otherwise, 5 leave box blank. 6 For bonuses, put "0" or 7 Substitutions allowed between Qtrs all "10" in the bonus 8 column. 9 10 Quarter 3 points points 60 sec. rds - trailing team Lightning Lightning goes first. 10 pts each. Bounceback Bounceback 20 pt bonus for sweep! Total Total 1 Quarter 4 2 Tossups worth 30, 20, or 3 10 points each 4 Put the appropriate 5 number in the column of 6 the team that answers 7 correctly. Otherwise leave 8 box blank. 9 10 Tiebreakers 1 Tiebreak questions Tie Breaker (Sudden are only used 2 have no point value Victory) to determine winner! 3 at all! Final Score NHBB Nationals Bowl 2016-2017 Bowl Playoff Packet 7 Bowl Playoff Packet 7 First Quarter (1) Description acceptable. This event was thought to have occurred in retaliation for the bombing of the perpetrator's Tunisian headquarters in Operation Wooden Leg. Muhammad Zaidan organized this event, which involved the redirection of a vessel to Tartus, Syria. A John Adams opera focusing on this event opens with two choruses of exiles and is named after its only casualty, the 69-year old Leon Klinghoffer.
    [Show full text]
  • Wh Owat Ches the Wat Chmen
    WHO WATCHES THE WATCHMEN WATCHES WHO WHO WATCHES THE WATCHMEN WATCHES WHO I see powerful echoes of what I personally experienced as Director of NSA and CIA. I only wish I had access to this fully developed intellectual framework and the courses of action it suggests while still in government. —General Michael V. Hayden (retired) Former Director of the CIA Director of the NSA e problem of secrecy is double edged and places key institutions and values of our democracy into collision. On the one hand, our country operates under a broad consensus that secrecy is antithetical to democratic rule and can encourage a variety of political deformations. But the obvious pitfalls are not the end of the story. A long list of abuses notwithstanding, secrecy, like openness, remains an essential prerequisite of self-governance. Ross’s study is a welcome and timely addition to the small body of literature examining this important subject. —Gabriel Schoenfeld Senior Fellow, Hudson Institute Author of Necessary Secrets: National Security, the Media, and the Rule of Law (W.W. Norton, May 2010). ? ? The topic of unauthorized disclosures continues to receive significant attention at the highest levels of government. In his book, Mr. Ross does an excellent job identifying the categories of harm to the intelligence community associated NI PRESS ROSS GARY with these disclosures. A detailed framework for addressing the issue is also proposed. This book is a must read for those concerned about the implications of unauthorized disclosures to U.S. national security. —William A. Parquette Foreign Denial and Deception Committee National Intelligence Council Gary Ross has pulled together in this splendid book all the raw material needed to spark a fresh discussion between the government and the media on how to function under our unique system of government in this ever-evolving information-rich environment.
    [Show full text]
  • Iran'in Siber Güvenlik Stratejisinin Saldiri Ve
    See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/334583513 İRAN’IN SİBER GÜVENLİK STRATEJİSİNİN SALDIRI VE SAVUNMA KAPASİTESİ BAKIMINDAN ANALİZİ Article in Turkish Studies - Social Sciences · January 2019 DOI: 10.29228/TurkishStudies.22799 CITATIONS READS 0 225 1 author: Ali Burak Darıcılı 35 PUBLICATIONS 21 CITATIONS SEE PROFILE All content following this page was uploaded by Ali Burak Darıcılı on 25 July 2019. The user has requested enhancement of the downloaded file. Turkish Studies Social Sciences Volume 14 Issue 3, 2019, p. 409-425 DOI: 10.29228/TurkishStudies.22799 ISSN: 2667-5617 Skopje/MACEDONIA-Ankara/TURKEY Research Article / Araştırma Makalesi A r t i c l e I n f o / M a k a l e B i l g i s i Received/Geliş: 04.02.2019 Accepted/Kabul: 10.06.2019 Report Dates/Rapor Tarihleri: Referee 1 (15.03.2019)-Referee 2 (11.03.2019)- Referee 3 (18.03.2019) This article was checked by iThenticate. ANALYSIS OF IRAN'S CYBER SECURITY STRATEGY WITH REGARD TO THE ATTACK AND THE DEFENSE CAPACITY Ali Burak DARICILI ABSTRACT The Stuxnet Virus was released in June 2010 and has affected Iran's nuclear facilities in Bushehr and Natanz. It was claimed that the United States of America (USA) and Israel secret services together have a role in the planning of this cyber-attack. Following this cover activity, also known as Operation Olympic Games in the literature, Iran considered the need to take serious measures in the field of cyber security and aimed to reach an effective cyber security capacity in cyber space with the investments made in 2010.
    [Show full text]
  • Andrew Futter Nuclear Weapons .Indd
    # 56 VALDAI PAPERS September 2016 www.valdaiclub.com NUCLEAR WEAPONS IN THE CYBER AGE: NEW CHALLENGES FOR SECURITY, STRATEGY AND STABILITY Andrew Futter About the author: Andrew Futter Senior Lecturer in International Politics, Department of Politics and International Relations, University of Leicester ; Fellow of the UK Higher Education Academy The views and opinions expressed in this Paper are those of the author and do not represent the views of the Valdai Discussion Club, unless explicitly stated otherwise. NUCLEAR WEAPONS IN THE CYBER AGE: NEW CHALLENGES FOR SECURITY, STRATEGY AND STABILITY The safe, secure and reliable management of nuclear weapons has always been a complex and complicated business, plagued by uncertainty and risks. But these challenges are being magnified and aggravated by new cyber tools, dynamics and capabilities, and from the threat posed by hackers seeking to gain access to, or interfere with, nuclear systems. The challenge is myriad in its scope, and ranges from the safe, secure and reliable nuclear C2, through fresh problems for information security, proliferation, and the safeguarding of highly sensitive nuclear secrets, to new complications for strategic deterrence and escalation, and the emergence of a cyber-nuclear security dilemma. While cyber threats may not currently undermine or supersede the role of nuclear weapons as the ultimate symbol of national security, increased uncertainty about the integrity and security of these systems raises questions for nuclear force management, thinking and strategy for all nuclear-armed states. The cyber challenge is nuanced and subtle, complicating and obfuscating the intrinsic difficulties of nuclear C2 and nuclear strategy rather than fundamentally transforming them.
    [Show full text]
  • Social Sciences Volume 14 Issue 3, 2019, P
    Turkish Studies Social Sciences Volume 14 Issue 3, 2019, p. 409-425 DOI: 10.29228/TurkishStudies.22799 ISSN: 2667-5617 Skopje/MACEDONIA-Ankara/TURKEY Research Article / Araştırma Makalesi A r t i c l e I n f o / M a k a l e B i l g i s i Received/Geliş: 04.02.2019 Accepted/Kabul: 10.06.2019 Report Dates/Rapor Tarihleri: Referee 1 (15.03.2019)-Referee 2 (11.03.2019)- Referee 3 (18.03.2019) This article was checked by iThenticate. ANALYSIS OF IRAN'S CYBER SECURITY STRATEGY WITH REGARD TO THE ATTACK AND THE DEFENSE CAPACITY Ali Burak DARICILI ABSTRACT The Stuxnet Virus was released in June 2010 and has affected Iran's nuclear facilities in Bushehr and Natanz. It was claimed that the United States of America (USA) and Israel secret services together have a role in the planning of this cyber-attack. Following this cover activity, also known as Operation Olympic Games in the literature, Iran considered the need to take serious measures in the field of cyber security and aimed to reach an effective cyber security capacity in cyber space with the investments made in 2010. As it is seen, Iran's plans to develop a cyber security strategy were realized within the scope of an action-reaction relation through a retaliation reflex after the mentioned attack to the nuclear facilities. Nevertheless, Iran's efforts to improve its cyber security capacity, which began with a motivation for retaliation in the first place, turned into a goal to make Iran a strong actor in cyberspace with the measures taken in the following periods.
    [Show full text]
  • Cyber Warfare and Challenges for the U.S.-ROK Alliance by Dr
    Korea Economic Institute of America ACADEMIC PAPER SERIES December 2, 2014 North Korea’s Cyber Warfare and Challenges for the U.S.-ROK Alliance By Dr. Alexandre Mansourov ABSTRACT Introduction Despite an inferior information communication environment, Since Kim Jong-il’s designation of his son Kim Jong-un as his suc- North Korea has a high capacity to conduct robust cyber operations cessor in January 2009, North Korea has come a long way to aimed at collecting foreign intelligence, disrupting foreign comput- develop its own doctrine of cyber operations, build the military ers, information and communication systems, networks and critical organizations tasked with the cyber warfare missions, procure infrastructures, and stirring public discontent and disorder in the the hardware and software required for cyber operations, train enemy states. The Korean People’s Army concentrated its efforts a corps of highly skilled professional cyber warriors, and develop on strengthening the cyber war capabilities through establishing a operational plans for cyber warfare. Pyongyang demonstrated command and control structure dedicated to cyber warfare, form- its cyber capabilities through the conduct of cyber warfare exer- ing military units specializing in cyber warfare, training expert man- cises and actual cyber operations aimed against what it consid- power, and advancing research and development of core cyber ers its enemy states – the Republic of Korea, United States, and technologies. North Korea critically depends on outside resources Japan. North Korea now has a credible cyber warfare capability for the conduct of its offensive cyber effects operations. threatening the world’s advanced nations. The U.S.-ROK alliance managers often find their response options This study analyzes the evolution of the North Korean thinking limited in the absence of a clearly identifiable North Korean gov- on the policy dimensions of cyber warfare and cyber war: how ernment source of cyber operations.
    [Show full text]
  • Who Watches the Watchmen? the Conflict Between National Security and Freedom of the Press
    WHO WATCHES THE WATCHMEN WATCHES WHO WHO WATCHES THE WATCHMEN WATCHES WHO I see powerful echoes of what I personally experienced as Director of NSA and CIA. I only wish I had access to this fully developed intellectual framework and the courses of action it suggests while still in government. —General Michael V. Hayden (retired) Former Director of the CIA Director of the NSA e problem of secrecy is double edged and places key institutions and values of our democracy into collision. On the one hand, our country operates under a broad consensus that secrecy is antithetical to democratic rule and can encourage a variety of political deformations. But the obvious pitfalls are not the end of the story. A long list of abuses notwithstanding, secrecy, like openness, remains an essential prerequisite of self-governance. Ross’s study is a welcome and timely addition to the small body of literature examining this important subject. —Gabriel Schoenfeld Senior Fellow, Hudson Institute Author of Necessary Secrets: National Security, the Media, and the Rule of Law (W.W. Norton, May 2010). ? ? The topic of unauthorized disclosures continues to receive significant attention at the highest levels of government. In his book, Mr. Ross does an excellent job identifying the categories of harm to the intelligence community associated NI PRESS ROSS GARY with these disclosures. A detailed framework for addressing the issue is also proposed. This book is a must read for those concerned about the implications of unauthorized disclosures to U.S. national security. —William A. Parquette Foreign Denial and Deception Committee National Intelligence Council Gary Ross has pulled together in this splendid book all the raw material needed to spark a fresh discussion between the government and the media on how to function under our unique system of government in this ever-evolving information-rich environment.
    [Show full text]
  • The Question of State Sponsored Cyber Terrorism and Espionage Student Officer
    st th The Hague International Model United Nations Qatar 2020 | 21 ​ – 24 ​ of January 2020 ​ ​ ​ ​ ​ Forum: The Security Council Issue: The Question of State sponsored cyber terrorism and espionage Student Officer: Sebastian Santoni Position: President Introduction On the 27th of April 2007, Estonia experienced the first of a series of cyber attacks which would go on to shape laws, policies, and attitudes within and outside its borders. The country was bombarded by thousands of independent actors, resulting in the complete loss of most internet services for three weeks. The Estonian parliament, banks and media were all targeted in the midst of political disagreements with Russia. Although not the first incident of cyber terrorism, this was definitely one of the most destructive, managing to make an entire country go offline. In response, the world’s first ever regulations concerning actions in cyberspace were drafted, hoping to prevent such incidents from occurring in the future. However, incidents of cyber terrorism and espionage continued and remain a major threat to international security. Not only can they create mistrust and paranoia between nations, but also paralyse the organizations and resources core to their economic, social and political stability. This is especially true when such acts are initiated by countries and their related bodies, placing the world’s most sophisticated technology in the wrong hands. As members of the United Nations, it is the responsibility of countries to use their resources, voices and cooperation to strengthen international cyber security and work towards a world where state-sponsored cyber terrorism and espionage are void. Organizations such as the Kaspersky Lab and the Cooperative Cyber Defence Center of Excellence have made strides toward combating the issue, although they are restricted by an acute lack of relevant treaties and laws.
    [Show full text]
  • Ankura Cyber Threat Intelligence Bulletin
    ANKURA CYBER THREAT INTELLIGENCE BULLETIN IRANIAN RETALIATORY OPTIONS & TACTICS, TECHNIQUES AND PROCEDURES (TTP) JANUARY 13, 2020 TABLE OF CONTENTS EXECUTIVE SUMMARY ................................................................................. 3 BACKGROUND .............................................................................................. 3 SUGGESTED RESPONSE ................................................................................ 5 SUGGESTED TACTICAL ACTIONS ................................................................... 5 APPENDIX A – IRANIAN THREAT GROUPS TRACKED BY CTAPT ..................... 6 Page 2 | 6 EXECUTIVE SUMMARY As a result of escalations in tensions in the Middle East, including the killing of Iran’s Quds Force leader and the recent cruise missile strike against Iraqi and US forces, Ankura’s Cyber Threat Analysis and Pursuit Team (CTAPT) assesses the likelihood of Iranian retaliatory actions in cyberspace as high. Iran’s history of carrying out destructive and disruptive cyber-attacks against the United States and its allies should serve as a forewarning to entities in the financial, critical infrastructure, and defense related industries. Furthermore, based upon reports that Iran-linked threat actors have begun targeting President Trump’s re-election efforts, CTAPT assesses that entities and individuals associated with President Trump’s 2020 campaign or the Republican party have a high likelihood of being targeted by sophisticated cyber espionage campaigns in the run-up to the November election.
    [Show full text]
  • Operation “Olympic Games” Securing Memory Sharing
    OPERATION “OLYMPIC GAMES” SECURING MEMORY SHARING FOR CLOUD TENANTS Kshitij Yadav Associate Sales Engineer Analyst Dell EMC [email protected] Abhiram T.S. Associate Sales Engineer Analyst Dell EMC [email protected] Knowledge Sharing Article © 2020 Dell Inc. or its subsidiaries. The Dell Technologies Proven Professional Certification program validates a wide range of skills and competencies across multiple technologies and products. From Associate, entry-level courses to Expert-level, experience-based exams, all professionals in or looking to begin a career in IT benefit from industry-leading training and certification paths from one of the world’s most trusted technology partners. Proven Professional certifications include: • Cloud • Converged/Hyperconverged Infrastructure • Data Protection • Data Science • Networking • Security • Servers • Storage • Enterprise Architect Courses are offered to meet different learning styles and schedules, including self-paced On Demand, remote-based Virtual Instructor-Led and in-person Classrooms. Whether you are an experienced IT professional or just getting started, Dell Technologies Proven Professional certifications are designed to clearly signal proficiency to colleagues and employers. Learn more at www.dell.com/certification 2020 Dell Technologies Proven Professional Knowledge Sharing 2 Table of Contents Introduction .................................................................................................................................................. 4 Stuxnet .....................................................................................................................................................
    [Show full text]
  • Strategic Culture and Cyber Strategy
    University of Central Florida STARS Honors Undergraduate Theses UCF Theses and Dissertations 2021 Strategic Culture and Cyber Strategy Andrew S. Olejarski University of Central Florida Part of the Political Science Commons Find similar works at: https://stars.library.ucf.edu/honorstheses University of Central Florida Libraries http://library.ucf.edu This Open Access is brought to you for free and open access by the UCF Theses and Dissertations at STARS. It has been accepted for inclusion in Honors Undergraduate Theses by an authorized administrator of STARS. For more information, please contact [email protected]. Recommended Citation Olejarski, Andrew S., "Strategic Culture and Cyber Strategy" (2021). Honors Undergraduate Theses. 877. https://stars.library.ucf.edu/honorstheses/877 STRATEGIC CULTURE AND CYBER STRATEGY by ANDREW S. OLEJARSKI A thesis submitted in partial fulfillment of the requirements for the Honors in the Major Program in Political Science in the College of Sciences and in the Burnett Honors College at the University of Central Florida Orlando, Florida Spring 2021 Thesis Chair: Ted Reynolds, Ph.D. ABSTRACT The intent of this paper is to explore the relationship between strategic culture theory and how it interacts with war-parallel usage of cyber methods. Cyber methods, at times incorrectly classified as “cyberwarfare”, as a means of statecraft are becoming increasingly prevalent, and developing an understanding of how states use them, particularly during conflicts, would be a great boon to the field of security studies. Strategic culture theory, an international relations theory focusing on the relationship between culture and strategy, may be an effective means to analyze conflict-parallel use of cyber methods.
    [Show full text]