SlideShare ist ein Scribd-Unternehmen logo
1 von 21
CYBER WARFARE IS THE ULTIMATE 
THREAT TO 
CYBER SECURITY. 
WHAT DOES LAW SAY ABOUT IT ? 
ADV. PRASHANT MALI 
CYBER LAW & CYBER SECURITY EXPERT
WHAT IS CYBER WARFARE? AS PEOPLE SAY 
• U.S. government security expert Richard A. Clarke, in his 
book Cyber War (May 2010), defines "cyberwarfare" as 
"actions by a nation-state to penetrate another nation's 
computers or networks for the purposes of causing damage or 
disruption." 
• The use of computing resources to intimidate, harm people, places or 
system we depend upon.
WHAT IS CYBER WARFARE ? 
• Cyberwarfare is politically motivated hacking to 
conduct sabotage and espionage. It is a form 
of information warfare sometimes seen as 
analogous to conventional warfare.[1] 
..Wikipidia
WHAT IS CYBER WARFARE ? 
• Cyber warfare is NOT about Penetration of Networks
WHAT IS CYBER WARFARE ? 
• Cyber warfare is NOT about defacing web sites
WHAT IS CYBER WARFARE ? 
• Cyber warfare is NOT about DDoS attacks
WHAT IS CYBER WARFARE ? 
• Cyber warfare is NOT about Malicious Software 
IT IS NOT 
EVEN CYBER TERRORISM 
OR 
CYBER ESPIONAGE
WHY NOT MALICIOUS CODE OR TROJAN ? 
• It has an Expiry date.. Before a Vulnerability is 
patched or “Snowdens are Awakened “ 
• It has associated pressure to “use it” before you 
“lose it.” 
• If no cyber conflict Where to use so becomes Stale 
• Cannot distinguish Friends or allies, can boomerang
WHY IT IS NOT CYBER TERRORISM ? 
• Cyberterrorism is the use of Internet based attacks 
in terrorist activities, including acts of deliberate, large-scale 
disruption of computer networks, especially of personal 
computers attached to the Internet, by the means of tools such 
as computer viruses. 
• Cyber Warfare is NOT About "Cyber-Enabling" Regular Terrorism
WHAT IS CYBER WARFARE THEN ? 
Low-intensity persistent asymmetric economic 
cyber attacks, such as spam Let’s start by looking 
at spam.
WHAT IS CYBER WARFARE THEN ? 
Cyber attacks on fundamental Internet protocols such 
as DNS (the domain name system) or BGP (the 
Internet’s wide area routing protocols)
WHAT IS CYBER WARFARE THEN ? 
Kinetic ("physical") attacks on high value Internet 
“choke points” such as cable landing sites or 
Internet exchange points
WHAT IS CYBER WARFARE THEN ? 
Operations conducted against critical civilian 
infrastructure such as industrial control systems 
(so-called “SCADA” systems)
WHAT IS CYBER WARFARE THEN ? 
• Strategic high altitude strikes aimed at destroying or 
disrupting national infrastructure on a wide-scale 
through electromagnetic pulse (EMP) effects
INTERNATIONAL LAW 
• Since the provisions of international agreements supersede the provisions for international cooperation, not 
only bilateral agreements but also multilateral agreements among nations must be signed. 
• UN Security Council should also focus on cyber terrorism threat. Most of the permanent members of the 
Council are also the most vulnerable and targeted countries in the world. 
• These countries also host most of the international cyber attacks. 
• A robust, international legal framework under UN that addresses cyber aggression is the most critical 
component of a comprehensive approach to deter cyber attack, much more critical than national offensive 
and defensive cyber capabilities. 
• International law and norms are fundamental to deterrence because states “share an interest in adopting or 
codifying common standards for the conduct of international transactions...or in promoting or banning 
specific kinds of behavior by” states. 
• In this way, international law builds the framework that guides how and when states employ offensive and 
defensive cyber capabilities and forms the foundation of cyber deterrence. International law adds certainty to 
punitive actions and amplifies the costs of cyber attack by engendering a negative response from the 
international community, not just from the attacked state
INCIDENTS 
• On 21 November 2011, it was widely reported in the U.S. media that a hacker had destroyed a water pump at 
the Curran-Gardner Township Public Water District in Illinois. However, it later turned out that this information 
was not only false, but had been inappropriately leaked from the Illinois Statewide Terrorism and Intelligence 
Center. 
• On 6 October 2011, it was announced that Creech AFB's drone and Predator fleet's command and control data 
stream has been key logged, resisting all attempts to reverse the exploit, for the past two weeks.The Air Force 
issued a statement that the virus had "posed no threat to our operational mission". 
• In July 2011, the South Korean company SK Communications was hacked, resulting in the theft of the personal 
details (including names, phone numbers, home and email addresses and resident registration numbers) of up 
to 35 million people. A trojaned software update was used to gain access to the SK Communications network. 
Links exist between this hack and other malicious activity and it is believed to be part of a broader, concerted 
hacking effort. 
• Operation Shady RAT is an ongoing series of cyber attacks starting mid-2006, reported by Internet security 
company McAfee in August 2011. The attacks have hit at least 72 organizations including governments and 
defense contractors.
INCIDENTS 
• On 4 December 2010, a group calling itself the Pakistan Cyber Army hacked the website of India's top investigating agency, 
the Central Bureau of Investigation (CBI). The National Informatics Center (NIC) has begun an inquiry. 
• On 26 November 2010, a group calling itself the Indian Cyber Army hacked the websites belonging to the Pakistan Army and 
the others belong to different ministries, including the Ministry of Foreign Affairs, Ministry of Education, Ministry of Finance, 
Pakistan Computer Bureau, Council of Islamic Ideology, etc. The attack was done as a revenge for the Mumbai terrorist 
attacks. 
• In October 2010, Iain Lobban, the director of the Government Communications Headquarters (GCHQ), said Britain faces a 
"real and credible" threat from cyber attacks by hostile states and criminals and government systems are targeted 1,000 
times each month, such attacks threatened Britain's economic future, and some countries were already using cyber assaults 
to put pressure on other nations. 
• In September 2010, Iran was attacked by the Stuxnet worm, thought to specifically target its Natanz nuclear enrichment 
facility. The worm is said to be the most advanced piece of malware ever discovered and significantly increases the profile of 
cyberwarfare. 
• In July 2009, there were a series of coordinated denial of service attacks against major government, news media, and 
financial websites in South Korea and the United States. While many thought the attack was directed by North Korea, one 
researcher traced the attacks to the United Kingdom.
INCIDENTS 
• Russian, South Ossetian, Georgian and Azerbaijani sites were attacked by hackers during the 2008 South 
Ossetia War. 
• In 2007 the website of the Kyrgyz Central Election Commission was defaced during its election. The 
message left on the website read "This site has been hacked by Dream of Estonian organization". During 
the election campaigns and riots preceding the election, there were cases of Denial-of-service attacks 
against the Kyrgyz ISPs. 
• In September 2007, Israel carried out an airstrike on Syria dubbed Operation Orchard. U.S. industry and 
military sources speculated that the Israelis may have used cyber warfare to allow their planes to pass 
undetected by radar into Syria. 
• In April 2007, Estonia came under cyber attack in the wake of relocation of the Bronze Soldier of Tallinn. 
The largest part of the attacks were coming from Russia and from official servers of the authorities of 
Russia. In the attack, ministries, banks, and media were targeted.
EFFORTS AT PROHIBITION 
• The Shanghai Cooperation Organization (members of which include China and Russia) defines cyberwar 
to include dissemination of information "harmful to the spiritual, moral and cultural spheres of other 
states". 
• In September 2011, these countries proposed to the UN Secretary General a document called 
"International code of conduct for information security". 
• The approach was not endorsed by western countries as it entailed too many hints on political 
censorship of the internet. 
• In contrast, the United States' approach focuses on physical and economic damage and injury, putting 
political concerns under freedom of speech. 
• In June 2013, Barack Obama and Vladimir Putin agreed to install a secure Cyberwar-Hotline providing "a 
direct secure voice communications line between the US cybersecurity coordinator and the Russian 
deputy secretary of the security council, should there be a need to directly manage a crisis situation 
arising from an ICT security incident."
THANK YOU 
Mobile:+919821763157 
cyberlawconsulting@gmail.com 
www.prashantmali.com

Weitere ähnliche Inhalte

Was ist angesagt?

cyber terrorism
cyber terrorismcyber terrorism
cyber terrorismAccenture
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorismSavigya Singh
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber TerrorismDeepak Pareek
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorismloverakk187
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdfAnupmaMunshi
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
Cyber crime
Cyber crime Cyber crime
Cyber crime Jayant Raj
 
Phishing ppt
Phishing pptPhishing ppt
Phishing pptshindept123
 
A military perspective on cyber security
A military perspective on cyber securityA military perspective on cyber security
A military perspective on cyber securityJoey Hernandez
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityAkash Dhiman
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -ideaflashed
 
Module 2_ Cyber offenses & Cybercrime.pptx
Module 2_ Cyber offenses & Cybercrime.pptxModule 2_ Cyber offenses & Cybercrime.pptx
Module 2_ Cyber offenses & Cybercrime.pptxnikshaikh786
 

Was ist angesagt? (20)

cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdf
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
A military perspective on cyber security
A military perspective on cyber securityA military perspective on cyber security
A military perspective on cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Module 2_ Cyber offenses & Cybercrime.pptx
Module 2_ Cyber offenses & Cybercrime.pptxModule 2_ Cyber offenses & Cybercrime.pptx
Module 2_ Cyber offenses & Cybercrime.pptx
 

Ähnlich wie Cyber warfare Threat to Cyber Security by Prashant Mali

Cyber war
Cyber warCyber war
Cyber warPraveen
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanShojan Jacob
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011hassanzadeh20
 
Trend of cyber terrorism in the present world.pptx
Trend of cyber terrorism in the present world.pptxTrend of cyber terrorism in the present world.pptx
Trend of cyber terrorism in the present world.pptxBini R A
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Kunihiro Maeda
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Chuck Brooks
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorismDharani Adusumalli
 
Instructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question conInstructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question consimba35
 
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Esam Abulkhirat
 
A View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years LaterA View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years LaterJulie Davis
 
Cyber Crimes.pptx
Cyber Crimes.pptxCyber Crimes.pptx
Cyber Crimes.pptxmnm Lastopop
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!amit_shanu
 
RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARTalwant Singh
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...David Sweigert
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityAndrea Rossetti
 
GovSec Joyal New Threat Matrix
GovSec Joyal New Threat MatrixGovSec Joyal New Threat Matrix
GovSec Joyal New Threat MatrixPaul Joyal
 

Ähnlich wie Cyber warfare Threat to Cyber Security by Prashant Mali (20)

Cyber war
Cyber warCyber war
Cyber war
 
Cyber Wars.pptx
Cyber Wars.pptxCyber Wars.pptx
Cyber Wars.pptx
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace Shojan
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
114-116
114-116114-116
114-116
 
Trend of cyber terrorism in the present world.pptx
Trend of cyber terrorism in the present world.pptxTrend of cyber terrorism in the present world.pptx
Trend of cyber terrorism in the present world.pptx
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Instructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question conInstructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question con
 
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
 
A View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years LaterA View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years Later
 
Cyber Crimes.pptx
Cyber Crimes.pptxCyber Crimes.pptx
Cyber Crimes.pptx
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWAR
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
Cyberware
CyberwareCyberware
Cyberware
 
GovSec Joyal New Threat Matrix
GovSec Joyal New Threat MatrixGovSec Joyal New Threat Matrix
GovSec Joyal New Threat Matrix
 
Internet Security Threat
Internet Security ThreatInternet Security Threat
Internet Security Threat
 

Mehr von Adv Prashant Mali

Electronic evidence for delhi judicial academy prashant mali
Electronic evidence  for delhi judicial academy prashant maliElectronic evidence  for delhi judicial academy prashant mali
Electronic evidence for delhi judicial academy prashant maliAdv Prashant Mali
 
9 things about indian cyber law prashant mali
9 things about indian cyber law   prashant mali9 things about indian cyber law   prashant mali
9 things about indian cyber law prashant maliAdv Prashant Mali
 
Social Media and Cyber Law in India By Prashant Mali
Social Media and Cyber Law in India By Prashant MaliSocial Media and Cyber Law in India By Prashant Mali
Social Media and Cyber Law in India By Prashant MaliAdv Prashant Mali
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in indiaAdv Prashant Mali
 
Electronic Evidence fraud conference
Electronic Evidence   fraud conferenceElectronic Evidence   fraud conference
Electronic Evidence fraud conferenceAdv Prashant Mali
 
Cloud computing legal issues
Cloud computing legal issuesCloud computing legal issues
Cloud computing legal issuesAdv Prashant Mali
 
What is business continuity planning-bcp
What is business continuity planning-bcpWhat is business continuity planning-bcp
What is business continuity planning-bcpAdv Prashant Mali
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSCAdv Prashant Mali
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Adv Prashant Mali
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Adv Prashant Mali
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Adv Prashant Mali
 
Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011Adv Prashant Mali
 
Cloud computing and Law-India legal summit
Cloud computing and Law-India legal summitCloud computing and Law-India legal summit
Cloud computing and Law-India legal summitAdv Prashant Mali
 
Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011Adv Prashant Mali
 
Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT securityAdv Prashant Mali
 

Mehr von Adv Prashant Mali (15)

Electronic evidence for delhi judicial academy prashant mali
Electronic evidence  for delhi judicial academy prashant maliElectronic evidence  for delhi judicial academy prashant mali
Electronic evidence for delhi judicial academy prashant mali
 
9 things about indian cyber law prashant mali
9 things about indian cyber law   prashant mali9 things about indian cyber law   prashant mali
9 things about indian cyber law prashant mali
 
Social Media and Cyber Law in India By Prashant Mali
Social Media and Cyber Law in India By Prashant MaliSocial Media and Cyber Law in India By Prashant Mali
Social Media and Cyber Law in India By Prashant Mali
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Electronic Evidence fraud conference
Electronic Evidence   fraud conferenceElectronic Evidence   fraud conference
Electronic Evidence fraud conference
 
Cloud computing legal issues
Cloud computing legal issuesCloud computing legal issues
Cloud computing legal issues
 
What is business continuity planning-bcp
What is business continuity planning-bcpWhat is business continuity planning-bcp
What is business continuity planning-bcp
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010
 
Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011
 
Cloud computing and Law-India legal summit
Cloud computing and Law-India legal summitCloud computing and Law-India legal summit
Cloud computing and Law-India legal summit
 
Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011
 
Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT security
 

KĂźrzlich hochgeladen

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

KĂźrzlich hochgeladen (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Cyber warfare Threat to Cyber Security by Prashant Mali

  • 1. CYBER WARFARE IS THE ULTIMATE THREAT TO CYBER SECURITY. WHAT DOES LAW SAY ABOUT IT ? ADV. PRASHANT MALI CYBER LAW & CYBER SECURITY EXPERT
  • 2. WHAT IS CYBER WARFARE? AS PEOPLE SAY • U.S. government security expert Richard A. Clarke, in his book Cyber War (May 2010), defines "cyberwarfare" as "actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption." • The use of computing resources to intimidate, harm people, places or system we depend upon.
  • 3. WHAT IS CYBER WARFARE ? • Cyberwarfare is politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare.[1] ..Wikipidia
  • 4. WHAT IS CYBER WARFARE ? • Cyber warfare is NOT about Penetration of Networks
  • 5. WHAT IS CYBER WARFARE ? • Cyber warfare is NOT about defacing web sites
  • 6. WHAT IS CYBER WARFARE ? • Cyber warfare is NOT about DDoS attacks
  • 7. WHAT IS CYBER WARFARE ? • Cyber warfare is NOT about Malicious Software IT IS NOT EVEN CYBER TERRORISM OR CYBER ESPIONAGE
  • 8.
  • 9. WHY NOT MALICIOUS CODE OR TROJAN ? • It has an Expiry date.. Before a Vulnerability is patched or “Snowdens are Awakened “ • It has associated pressure to “use it” before you “lose it.” • If no cyber conflict Where to use so becomes Stale • Cannot distinguish Friends or allies, can boomerang
  • 10. WHY IT IS NOT CYBER TERRORISM ? • Cyberterrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses. • Cyber Warfare is NOT About "Cyber-Enabling" Regular Terrorism
  • 11. WHAT IS CYBER WARFARE THEN ? Low-intensity persistent asymmetric economic cyber attacks, such as spam Let’s start by looking at spam.
  • 12. WHAT IS CYBER WARFARE THEN ? Cyber attacks on fundamental Internet protocols such as DNS (the domain name system) or BGP (the Internet’s wide area routing protocols)
  • 13. WHAT IS CYBER WARFARE THEN ? Kinetic ("physical") attacks on high value Internet “choke points” such as cable landing sites or Internet exchange points
  • 14. WHAT IS CYBER WARFARE THEN ? Operations conducted against critical civilian infrastructure such as industrial control systems (so-called “SCADA” systems)
  • 15. WHAT IS CYBER WARFARE THEN ? • Strategic high altitude strikes aimed at destroying or disrupting national infrastructure on a wide-scale through electromagnetic pulse (EMP) effects
  • 16. INTERNATIONAL LAW • Since the provisions of international agreements supersede the provisions for international cooperation, not only bilateral agreements but also multilateral agreements among nations must be signed. • UN Security Council should also focus on cyber terrorism threat. Most of the permanent members of the Council are also the most vulnerable and targeted countries in the world. • These countries also host most of the international cyber attacks. • A robust, international legal framework under UN that addresses cyber aggression is the most critical component of a comprehensive approach to deter cyber attack, much more critical than national offensive and defensive cyber capabilities. • International law and norms are fundamental to deterrence because states “share an interest in adopting or codifying common standards for the conduct of international transactions...or in promoting or banning specific kinds of behavior by” states. • In this way, international law builds the framework that guides how and when states employ offensive and defensive cyber capabilities and forms the foundation of cyber deterrence. International law adds certainty to punitive actions and amplifies the costs of cyber attack by engendering a negative response from the international community, not just from the attacked state
  • 17. INCIDENTS • On 21 November 2011, it was widely reported in the U.S. media that a hacker had destroyed a water pump at the Curran-Gardner Township Public Water District in Illinois. However, it later turned out that this information was not only false, but had been inappropriately leaked from the Illinois Statewide Terrorism and Intelligence Center. • On 6 October 2011, it was announced that Creech AFB's drone and Predator fleet's command and control data stream has been key logged, resisting all attempts to reverse the exploit, for the past two weeks.The Air Force issued a statement that the virus had "posed no threat to our operational mission". • In July 2011, the South Korean company SK Communications was hacked, resulting in the theft of the personal details (including names, phone numbers, home and email addresses and resident registration numbers) of up to 35 million people. A trojaned software update was used to gain access to the SK Communications network. Links exist between this hack and other malicious activity and it is believed to be part of a broader, concerted hacking effort. • Operation Shady RAT is an ongoing series of cyber attacks starting mid-2006, reported by Internet security company McAfee in August 2011. The attacks have hit at least 72 organizations including governments and defense contractors.
  • 18. INCIDENTS • On 4 December 2010, a group calling itself the Pakistan Cyber Army hacked the website of India's top investigating agency, the Central Bureau of Investigation (CBI). The National Informatics Center (NIC) has begun an inquiry. • On 26 November 2010, a group calling itself the Indian Cyber Army hacked the websites belonging to the Pakistan Army and the others belong to different ministries, including the Ministry of Foreign Affairs, Ministry of Education, Ministry of Finance, Pakistan Computer Bureau, Council of Islamic Ideology, etc. The attack was done as a revenge for the Mumbai terrorist attacks. • In October 2010, Iain Lobban, the director of the Government Communications Headquarters (GCHQ), said Britain faces a "real and credible" threat from cyber attacks by hostile states and criminals and government systems are targeted 1,000 times each month, such attacks threatened Britain's economic future, and some countries were already using cyber assaults to put pressure on other nations. • In September 2010, Iran was attacked by the Stuxnet worm, thought to specifically target its Natanz nuclear enrichment facility. The worm is said to be the most advanced piece of malware ever discovered and significantly increases the profile of cyberwarfare. • In July 2009, there were a series of coordinated denial of service attacks against major government, news media, and financial websites in South Korea and the United States. While many thought the attack was directed by North Korea, one researcher traced the attacks to the United Kingdom.
  • 19. INCIDENTS • Russian, South Ossetian, Georgian and Azerbaijani sites were attacked by hackers during the 2008 South Ossetia War. • In 2007 the website of the Kyrgyz Central Election Commission was defaced during its election. The message left on the website read "This site has been hacked by Dream of Estonian organization". During the election campaigns and riots preceding the election, there were cases of Denial-of-service attacks against the Kyrgyz ISPs. • In September 2007, Israel carried out an airstrike on Syria dubbed Operation Orchard. U.S. industry and military sources speculated that the Israelis may have used cyber warfare to allow their planes to pass undetected by radar into Syria. • In April 2007, Estonia came under cyber attack in the wake of relocation of the Bronze Soldier of Tallinn. The largest part of the attacks were coming from Russia and from official servers of the authorities of Russia. In the attack, ministries, banks, and media were targeted.
  • 20. EFFORTS AT PROHIBITION • The Shanghai Cooperation Organization (members of which include China and Russia) defines cyberwar to include dissemination of information "harmful to the spiritual, moral and cultural spheres of other states". • In September 2011, these countries proposed to the UN Secretary General a document called "International code of conduct for information security". • The approach was not endorsed by western countries as it entailed too many hints on political censorship of the internet. • In contrast, the United States' approach focuses on physical and economic damage and injury, putting political concerns under freedom of speech. • In June 2013, Barack Obama and Vladimir Putin agreed to install a secure Cyberwar-Hotline providing "a direct secure voice communications line between the US cybersecurity coordinator and the Russian deputy secretary of the security council, should there be a need to directly manage a crisis situation arising from an ICT security incident."
  • 21. THANK YOU Mobile:+919821763157 cyberlawconsulting@gmail.com www.prashantmali.com