SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Cyberspace-New Operational field of confrontations
Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant
Cyberspace
New Operational field of confrontations
Technological progress gives mankind the advantage of easily carrying out of
all kinds of activities through system interconnection (networking), causing increasing
dependency on smooth and seamless operation of these systems.
This advantage, under specific conditions could turn into a vulnerability.
A vulnerability, as the single, continuous, dynamic set of interconnected systems
(people, information systems, computer networks, communications, databases,
information, software, equipment and processes), which is used in every field of human
activities (military, political, economic, social, etc.), is vulnerable partly or as a whole to
threats that have arisen, as a consequence of this very interconnection.
These threats may stem from individuals, organized groups, or even from states,
while the risk they (threats) represent is directly proportional, among other things, to
the breadth of networking combined with the development of broadband as well as
the criticality of the activities it supports.
With emphasis on the last decade and in combination with the so-called
"globalization", the dominant pillar of which is the extensive use of technology and in
particular the Internet, a new man-made (non- physical) , "field of confrontation"
analogous and overlapping to the existing physical spaces/fields (land, sea, air, space)
was created, the cyberspace.
Cyberspace can be defined as:
Cyberspace-New Operational field of confrontations
Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant
"...The global domain consisting of all interconnected communication,
information and other electronic systems, networks and their data, including those that
are separate or independent, that process, store or transmit data...".
Cyberspace can be considered as a multi-dimensional space that takes shape
on three levels with their respective components:
(1) Physical Layer
(2) Logical Layer
(3) Social Layer-Social Layer
The new area of confrontation and the asymmetric threats arising from its
existence and use against adversary critical information infrastructures (civil or military)
make it an accessible low-cost strategic weapon and force multiplier, as it is possible
using this field to:
1. Attack part or whole country's Information Infrastructure and of course state’s
command and control system (political or military) that depends on it, without
requiring the existence of heavy industry, strategic reserves of raw materials or the
payment of high costs , regardless of geographical boundaries and with zero possibility
of human losses on the part of the attacker.
2. To occur, disruption of operations in Command and Control (C4I) systems,
financial systems, interception or alteration of information, questioning the reliability
of data and therefore confusion the decision-making procedures, financial burden,
increased staff workload, influence on public opinion, social unrest and possibly
natural disasters and human casualties.
Cyberspace constitutes the fifth dimension of confrontations with the difference
that it provides the right conditions for conducting a covert war, in which there is a
possibility that neither side recognizes that takes part in conflict or even that it has
been attacked, but even if it does recognize this, it is very difficult or even impossible
to clear identify the opponent, the area and the way he operates.
In particular, for military activity in the era of the "Information Revolution",
cyberspace is considered a new field, where various belligerent forces seek to prevail
over their adversaries. However, dominance in cyberspace is a complex issue, as it is
not equivalent to the dominance of a single material space (such as space or ground)
subject to the laws of nature, but instead it is about securing an advantageous position
in a complex human construction, which can be repeated and whose function is based
on the coordinated action of material elements, artificial rules and real data.
The generalized perception that Cyberspace is one and only, but also treating
the two terms (Cyberspace and Internet) as identical, without their interchange
implying any conceptual differentiation is a fallacy, as each individual electronic
system-network has the ability to creates its own cyberspace, within which the right of
access and the very existence of a user-actor should be recognized, so that his actions
acquire meaning and interact with the actions of others. Therefore, in the context of a
Cyberspace-New Operational field of confrontations
Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant
conflict, it is crucial to ensure the sovereignty of the cyberspace in which each faction's
military target is located.
Cyberspace as an operational environment has several unique features:
1. It does not obey in space-time limitations since an action in or through it can
be performed in a short time (seconds), from significantly long distances (global
coverage) without requiring proximity to the opponent, and in most cases without
early warning.
2. Attribution for an aggressive action is extremely difficult , since the
perpetrators could act in disguise, hiding their real identity and goals.
3. The cost of developing cyber capabilities as well as conducting cyber
operations in this field is much lower, compared to the cost of conventional operations.
4. It contains constantly dynamically configured, huge amounts of high and/or
classified information of high value, in structured or unstructured form which are
mainly transmitted through commercial networks and without following the same path
from the issuer to the recipient, or the same safety standards.
5. It has created global conditions of dependence from it (according to
information technology degree of penetration in each state) to all forms of human
activity, since within or through it, daily actions take place that serve the total of
economic, business, communication, social, state, military activities of citizens and
states.
In order for respective groups to understand and analyze the unique
operational environment, cyberspace and cyber operations are inextricably linked with
the use of eight interrelated operational variables (political, economic, social, military,
informational, infrastructure, physical environment, time).
Under these circumstances and taking into account the phenomenal rate of
diffusion, evolution and penetration of information and communication technologies,
combined with the ever-increasing addition of critical infrastructure in this field, states
should:
1. Address cyber operations in terms of an "Asymmetric Threat" and as "Force
Multiplier" since the increasing state dependence on information and communication
technologies combined with the low cost of developing cyber-capabilities and the
severity of the damage which may cause, reducing them to a unique solution that
many adversaries can exploit in order to maintain the balance or gain some advantage
in terms of military power over an adversary.
2. Develop and use appropriate defense capabilities (cyber defense) in
cyberspace in order to protect national critical infrastructures.
3. Operate against a wide range of actors (Nation-states, state-sponsored
actors, non-state actors, legitimate enterprises, criminal organizations, and individuals,
etc.), with different levels of education, training, skills, motivations and abilities, which
is a significant change in traditional geopolitical and military perceptions of enemy and
Cyberspace-New Operational field of confrontations
Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant
threat of a specific orientation (geographical, ideological, etc.) and requires a new
perspective in terms of operations as well as a different type of training.
4. Develop on a daily basis effective relationships and collaborations with all
actors (public, private, academic institutes, military forces) involved in the field of
cyberspace since this field is created, owned, maintained and operated by public,
private, and government agencies around the world, with the result that research, and
development carried out by these agencies will largely be the catalyst for changes in
cyberspace operations.
New trends want the field of cyberspace to be considered as a subset of the
wider information environment which also includes other fields such as the
electromagnetic spectrum, space, etc., and correspondingly cyberspace operations
integrated into information operations to achieve their maximum potential.

Weitere ähnliche Inhalte

Ähnlich wie Cyberspace_New Operational Domain

Meeting national security_space_needs_in_the_contested_cyberspace_domain
Meeting national security_space_needs_in_the_contested_cyberspace_domainMeeting national security_space_needs_in_the_contested_cyberspace_domain
Meeting national security_space_needs_in_the_contested_cyberspace_domainDarwin Chimbo
 
Reliability not Reliance.
Reliability not Reliance.Reliability not Reliance.
Reliability not Reliance.George Briggs
 
Cyber security from military point of view
Cyber security from military point of viewCyber security from military point of view
Cyber security from military point of viewS.E. CTS CERT-GOV-MD
 
College of Doctoral StudiesRES-845 Module 2 Problem.docx
        College of Doctoral StudiesRES-845 Module 2 Problem.docx        College of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docxShiraPrater50
 
College of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docxCollege of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docxadkinspaige22
 
Cyber weapons 1632578286
Cyber weapons 1632578286Cyber weapons 1632578286
Cyber weapons 1632578286Udaysharma3
 
Final Paper Draft Outline – Week 7 For the second to last.docx
Final Paper Draft Outline – Week 7  For the second to last.docxFinal Paper Draft Outline – Week 7  For the second to last.docx
Final Paper Draft Outline – Week 7 For the second to last.docxcharlottej5
 
State Management Mechanisms for the Exchange of Information Regarding Cyberat...
State Management Mechanisms for the Exchange of Information Regarding Cyberat...State Management Mechanisms for the Exchange of Information Regarding Cyberat...
State Management Mechanisms for the Exchange of Information Regarding Cyberat...Igor Britchenko
 
Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011Mousselmal Tarik
 
Citizen Communications in Crisis - Liu and Palen
Citizen Communications in Crisis  - Liu and PalenCitizen Communications in Crisis  - Liu and Palen
Citizen Communications in Crisis - Liu and PalenSophia B Liu
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityAndrea Rossetti
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Ajay Serohi
 
VFAC REVIEW issue12_extract_2016
VFAC REVIEW issue12_extract_2016VFAC REVIEW issue12_extract_2016
VFAC REVIEW issue12_extract_2016Cameron Brown
 
Sputnik Education Reform Movement
Sputnik Education Reform MovementSputnik Education Reform Movement
Sputnik Education Reform MovementJennifer Reither
 
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...Brent Guglielmino
 
IT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesIT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesAsst.prof M.Gokilavani
 

Ähnlich wie Cyberspace_New Operational Domain (20)

Meeting national security_space_needs_in_the_contested_cyberspace_domain
Meeting national security_space_needs_in_the_contested_cyberspace_domainMeeting national security_space_needs_in_the_contested_cyberspace_domain
Meeting national security_space_needs_in_the_contested_cyberspace_domain
 
Reliability not Reliance.
Reliability not Reliance.Reliability not Reliance.
Reliability not Reliance.
 
Cyber War
Cyber WarCyber War
Cyber War
 
Cyber security from military point of view
Cyber security from military point of viewCyber security from military point of view
Cyber security from military point of view
 
College of Doctoral StudiesRES-845 Module 2 Problem.docx
        College of Doctoral StudiesRES-845 Module 2 Problem.docx        College of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docx
 
College of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docxCollege of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docx
 
Cyber weapons 1632578286
Cyber weapons 1632578286Cyber weapons 1632578286
Cyber weapons 1632578286
 
Vol1ch03
Vol1ch03Vol1ch03
Vol1ch03
 
Final Paper Draft Outline – Week 7 For the second to last.docx
Final Paper Draft Outline – Week 7  For the second to last.docxFinal Paper Draft Outline – Week 7  For the second to last.docx
Final Paper Draft Outline – Week 7 For the second to last.docx
 
State Management Mechanisms for the Exchange of Information Regarding Cyberat...
State Management Mechanisms for the Exchange of Information Regarding Cyberat...State Management Mechanisms for the Exchange of Information Regarding Cyberat...
State Management Mechanisms for the Exchange of Information Regarding Cyberat...
 
Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011
 
Citizen Communications in Crisis - Liu and Palen
Citizen Communications in Crisis  - Liu and PalenCitizen Communications in Crisis  - Liu and Palen
Citizen Communications in Crisis - Liu and Palen
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
 
VFAC REVIEW issue12_extract_2016
VFAC REVIEW issue12_extract_2016VFAC REVIEW issue12_extract_2016
VFAC REVIEW issue12_extract_2016
 
L479096.pdf
L479096.pdfL479096.pdf
L479096.pdf
 
Sputnik Education Reform Movement
Sputnik Education Reform MovementSputnik Education Reform Movement
Sputnik Education Reform Movement
 
Insa cyber intelligence_2011-1
Insa cyber intelligence_2011-1Insa cyber intelligence_2011-1
Insa cyber intelligence_2011-1
 
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
 
IT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesIT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notes
 

Mehr von Papadakis K.-Cyber-Information Warfare Analyst & Cyber Defense/Security Consultant-Hellenic MoD

Mehr von Papadakis K.-Cyber-Information Warfare Analyst & Cyber Defense/Security Consultant-Hellenic MoD (20)

Russia Ukraine Conflict_Cyberspace Operations_2021_2023.pdf
Russia Ukraine Conflict_Cyberspace Operations_2021_2023.pdfRussia Ukraine Conflict_Cyberspace Operations_2021_2023.pdf
Russia Ukraine Conflict_Cyberspace Operations_2021_2023.pdf
 
Mitigation of cyber threats 1a.pdf
Mitigation of cyber threats 1a.pdfMitigation of cyber threats 1a.pdf
Mitigation of cyber threats 1a.pdf
 
CYBER KILL CHAIN Table
CYBER KILL CHAIN TableCYBER KILL CHAIN Table
CYBER KILL CHAIN Table
 
Logismika Parakolouthisis.docx
Logismika Parakolouthisis.docxLogismika Parakolouthisis.docx
Logismika Parakolouthisis.docx
 
Surveillance Software.docx
Surveillance Software.docxSurveillance Software.docx
Surveillance Software.docx
 
Ρωσία εναντίον Εσθονίας:ο πρώτος κυβερνοπόλεμος (2007)
Ρωσία εναντίον Εσθονίας:ο πρώτος κυβερνοπόλεμος (2007)Ρωσία εναντίον Εσθονίας:ο πρώτος κυβερνοπόλεμος (2007)
Ρωσία εναντίον Εσθονίας:ο πρώτος κυβερνοπόλεμος (2007)
 
Russia vs Estonia_First Cyber War (2007)
Russia vs Estonia_First Cyber War (2007)Russia vs Estonia_First Cyber War (2007)
Russia vs Estonia_First Cyber War (2007)
 
ΚΥΒΕΡΝΟΠΟΛΕΜΟΣ
ΚΥΒΕΡΝΟΠΟΛΕΜΟΣΚΥΒΕΡΝΟΠΟΛΕΜΟΣ
ΚΥΒΕΡΝΟΠΟΛΕΜΟΣ
 
Κυβερνοχώρος: Νέο πεδίο αντιπαραθέσεων
Κυβερνοχώρος: Νέο πεδίο αντιπαραθέσεωνΚυβερνοχώρος: Νέο πεδίο αντιπαραθέσεων
Κυβερνοχώρος: Νέο πεδίο αντιπαραθέσεων
 
Πληροφοριακός Πόλεμος-Information Warfare
Πληροφοριακός Πόλεμος-Information WarfareΠληροφοριακός Πόλεμος-Information Warfare
Πληροφοριακός Πόλεμος-Information Warfare
 
Corporate Cyber Security
Corporate Cyber SecurityCorporate Cyber Security
Corporate Cyber Security
 
Russia Georgia 2008 Conflict-Information Operations, Cyberwarfare
Russia Georgia 2008 Conflict-Information Operations, CyberwarfareRussia Georgia 2008 Conflict-Information Operations, Cyberwarfare
Russia Georgia 2008 Conflict-Information Operations, Cyberwarfare
 
Cyber risks for enterprises-Vacations Time
Cyber risks for enterprises-Vacations TimeCyber risks for enterprises-Vacations Time
Cyber risks for enterprises-Vacations Time
 
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
 
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και ΝαυτιλίαMaritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
 
Κυβερνοπόλεμος-Επιχειρήσεις Κυβερνοχώρου-Cyber War-Cyber Warfare
Κυβερνοπόλεμος-Επιχειρήσεις Κυβερνοχώρου-Cyber War-Cyber WarfareΚυβερνοπόλεμος-Επιχειρήσεις Κυβερνοχώρου-Cyber War-Cyber Warfare
Κυβερνοπόλεμος-Επιχειρήσεις Κυβερνοχώρου-Cyber War-Cyber Warfare
 
Οδηγός Προστασίας από την Ηλεκτρονική Εξαπάτηση-Phihing Guide
Οδηγός Προστασίας από την Ηλεκτρονική Εξαπάτηση-Phihing GuideΟδηγός Προστασίας από την Ηλεκτρονική Εξαπάτηση-Phihing Guide
Οδηγός Προστασίας από την Ηλεκτρονική Εξαπάτηση-Phihing Guide
 
Οδηγός Ορθής χρήσης Μέσων Κοινωνικής Δικτύωσης-Social Media Cyber Security Guide
Οδηγός Ορθής χρήσης Μέσων Κοινωνικής Δικτύωσης-Social Media Cyber Security GuideΟδηγός Ορθής χρήσης Μέσων Κοινωνικής Δικτύωσης-Social Media Cyber Security Guide
Οδηγός Ορθής χρήσης Μέσων Κοινωνικής Δικτύωσης-Social Media Cyber Security Guide
 
Cyber Attack to Turkey Dec 2015
Cyber Attack to Turkey Dec 2015 Cyber Attack to Turkey Dec 2015
Cyber Attack to Turkey Dec 2015
 
Cyber Influence Operations
Cyber Influence OperationsCyber Influence Operations
Cyber Influence Operations
 

Kürzlich hochgeladen

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 

Kürzlich hochgeladen (20)

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

Cyberspace_New Operational Domain

  • 1. Cyberspace-New Operational field of confrontations Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant Cyberspace New Operational field of confrontations Technological progress gives mankind the advantage of easily carrying out of all kinds of activities through system interconnection (networking), causing increasing dependency on smooth and seamless operation of these systems. This advantage, under specific conditions could turn into a vulnerability. A vulnerability, as the single, continuous, dynamic set of interconnected systems (people, information systems, computer networks, communications, databases, information, software, equipment and processes), which is used in every field of human activities (military, political, economic, social, etc.), is vulnerable partly or as a whole to threats that have arisen, as a consequence of this very interconnection. These threats may stem from individuals, organized groups, or even from states, while the risk they (threats) represent is directly proportional, among other things, to the breadth of networking combined with the development of broadband as well as the criticality of the activities it supports. With emphasis on the last decade and in combination with the so-called "globalization", the dominant pillar of which is the extensive use of technology and in particular the Internet, a new man-made (non- physical) , "field of confrontation" analogous and overlapping to the existing physical spaces/fields (land, sea, air, space) was created, the cyberspace. Cyberspace can be defined as:
  • 2. Cyberspace-New Operational field of confrontations Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant "...The global domain consisting of all interconnected communication, information and other electronic systems, networks and their data, including those that are separate or independent, that process, store or transmit data...". Cyberspace can be considered as a multi-dimensional space that takes shape on three levels with their respective components: (1) Physical Layer (2) Logical Layer (3) Social Layer-Social Layer The new area of confrontation and the asymmetric threats arising from its existence and use against adversary critical information infrastructures (civil or military) make it an accessible low-cost strategic weapon and force multiplier, as it is possible using this field to: 1. Attack part or whole country's Information Infrastructure and of course state’s command and control system (political or military) that depends on it, without requiring the existence of heavy industry, strategic reserves of raw materials or the payment of high costs , regardless of geographical boundaries and with zero possibility of human losses on the part of the attacker. 2. To occur, disruption of operations in Command and Control (C4I) systems, financial systems, interception or alteration of information, questioning the reliability of data and therefore confusion the decision-making procedures, financial burden, increased staff workload, influence on public opinion, social unrest and possibly natural disasters and human casualties. Cyberspace constitutes the fifth dimension of confrontations with the difference that it provides the right conditions for conducting a covert war, in which there is a possibility that neither side recognizes that takes part in conflict or even that it has been attacked, but even if it does recognize this, it is very difficult or even impossible to clear identify the opponent, the area and the way he operates. In particular, for military activity in the era of the "Information Revolution", cyberspace is considered a new field, where various belligerent forces seek to prevail over their adversaries. However, dominance in cyberspace is a complex issue, as it is not equivalent to the dominance of a single material space (such as space or ground) subject to the laws of nature, but instead it is about securing an advantageous position in a complex human construction, which can be repeated and whose function is based on the coordinated action of material elements, artificial rules and real data. The generalized perception that Cyberspace is one and only, but also treating the two terms (Cyberspace and Internet) as identical, without their interchange implying any conceptual differentiation is a fallacy, as each individual electronic system-network has the ability to creates its own cyberspace, within which the right of access and the very existence of a user-actor should be recognized, so that his actions acquire meaning and interact with the actions of others. Therefore, in the context of a
  • 3. Cyberspace-New Operational field of confrontations Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant conflict, it is crucial to ensure the sovereignty of the cyberspace in which each faction's military target is located. Cyberspace as an operational environment has several unique features: 1. It does not obey in space-time limitations since an action in or through it can be performed in a short time (seconds), from significantly long distances (global coverage) without requiring proximity to the opponent, and in most cases without early warning. 2. Attribution for an aggressive action is extremely difficult , since the perpetrators could act in disguise, hiding their real identity and goals. 3. The cost of developing cyber capabilities as well as conducting cyber operations in this field is much lower, compared to the cost of conventional operations. 4. It contains constantly dynamically configured, huge amounts of high and/or classified information of high value, in structured or unstructured form which are mainly transmitted through commercial networks and without following the same path from the issuer to the recipient, or the same safety standards. 5. It has created global conditions of dependence from it (according to information technology degree of penetration in each state) to all forms of human activity, since within or through it, daily actions take place that serve the total of economic, business, communication, social, state, military activities of citizens and states. In order for respective groups to understand and analyze the unique operational environment, cyberspace and cyber operations are inextricably linked with the use of eight interrelated operational variables (political, economic, social, military, informational, infrastructure, physical environment, time). Under these circumstances and taking into account the phenomenal rate of diffusion, evolution and penetration of information and communication technologies, combined with the ever-increasing addition of critical infrastructure in this field, states should: 1. Address cyber operations in terms of an "Asymmetric Threat" and as "Force Multiplier" since the increasing state dependence on information and communication technologies combined with the low cost of developing cyber-capabilities and the severity of the damage which may cause, reducing them to a unique solution that many adversaries can exploit in order to maintain the balance or gain some advantage in terms of military power over an adversary. 2. Develop and use appropriate defense capabilities (cyber defense) in cyberspace in order to protect national critical infrastructures. 3. Operate against a wide range of actors (Nation-states, state-sponsored actors, non-state actors, legitimate enterprises, criminal organizations, and individuals, etc.), with different levels of education, training, skills, motivations and abilities, which is a significant change in traditional geopolitical and military perceptions of enemy and
  • 4. Cyberspace-New Operational field of confrontations Papadakis Konstantinos, Cyber- Information Warfare Analyst & Cyber Defense/Security Consultant threat of a specific orientation (geographical, ideological, etc.) and requires a new perspective in terms of operations as well as a different type of training. 4. Develop on a daily basis effective relationships and collaborations with all actors (public, private, academic institutes, military forces) involved in the field of cyberspace since this field is created, owned, maintained and operated by public, private, and government agencies around the world, with the result that research, and development carried out by these agencies will largely be the catalyst for changes in cyberspace operations. New trends want the field of cyberspace to be considered as a subset of the wider information environment which also includes other fields such as the electromagnetic spectrum, space, etc., and correspondingly cyberspace operations integrated into information operations to achieve their maximum potential.