SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Downloaden Sie, um offline zu lesen
Cyberwarfare and
aggressiveness in cyberspace
Jarno Limnéll
Professor, Cybersecurity, Aalto University
VP, Cybersecurity, Insta Group Ltd.
Doctor of Military Science
@JarnoLim
New Normal in Security:
Speed of Change
Unpredictable Instability
Digital-Physical Complexity
Cyber is an element in all crisis and wars
Evolution – not revolution
Cybersabotage has begun to emerge in conflicts
“Cyberattack on German steel plant
caused significant damage”
KINETIC CYBER
“A cyber attack on the French
television network TV5 Monde”
FALSE FLAG ATTACKS
“The Dukes: 7 Years of Russian Cyber-
Espionage”
STRATEGIC CYBER ESPIONAGE “Hackers breach the Warsaw Stock
Exchange”
CRITICAL INFRASTRUCTURE
Russians (and others) are testing the
boundaries of the cyberbattlefield.
Russia has a wide range of tools and resources, including the
ability to carry out denial-of-service attacks, develop
sophisticated malware and exploit previously unknown
software vulnerabilities.
Russian cyber activities are focused mainly on intelligence
gathering and military reconnaissance of critical infrastructure
networks as advance work for a future conflict.”
Most worryingly, today’s intelligence operations
enable tomorrow’s military actions.
Coordinated December 2015 attack on the Ukrainian electrical
grid was clearly an attack on critical national infrastructure.
Motive?
- Testing and research
- Creating deterrence (send a public message)
- Revenge (power outage earlier in Crimea)
OVERALL CYBER CAPABILITIES (scale 1-10 / offense, defense, dependence) *
State Cyber
Offense
Cyber
Defense
Cyber
Dependence **
Total
Iran 4 3 5 12
Estonia 3 8 1 12
Great Britain 7 5 2 14
South Korea 6 5 3 14
North Korea 3 3 9 15
Germany 7 7 2 16
Israel 8 6 3 17
United States 10 5 2 17
China 8 5 4 17
Russia 8 8 3 19
* Analysis is based on information in different public sources
* Dependence is a reverse score (more dependent means more vulnerable)
Jarno Limnéll
Kyberturvallisuuden kokonaisuus
9
Digital security integral part of today´s security:
Dependence increases and
More sophisticated capabilities being developed.
The speed of cyber attacks and their
sophistication has changed dramatically.
Cybersecurity =
Protecting our societies, our
businesses and our way of life
“Russia and China are the most
sophisticated nation-state actors in
the new generation of cyberwarfare,
and Russian hackers lead in terms of
sophistication, programming power
and inventiveness.”
Digital-Physical
Interaction
States consider cyber capabilities as an integral part of
operational military capability and are not afraid to
employ them.
How to integrate cyber capabilities to
other capabilities
Innovation and people
Talented Individuals – Who will have and
educate them in constantly changing security?
Most valuable skills for
cybersecurity career in next
years might not be a focus in
specific technology, but ability
to understand big picture.
From Technology- and
Control-centric to
Humancentric Cybersecurity
Future cyberwarfare is less hacking power
grids and more "hacking minds" by
shaping environment in which political
reality takes place.
Cyberpolitics
Trend:
The world is moving towards a
greater strategic use of cyber
capabilities
to persuade adversaries to
change their behavior.
Beginning – End
Our side – Their side
Military – Civilian
Involved – Not-involved
Win – Lose
Violence – Non-violence
Dichotomies are blurring
SECURITY INSECURITY
The lines between cyber activists, criminals and state-paid
hackers are becoming increasingly blurred.
1) Defend own networks – improving quality in all member states
2) Increase education and training
3) Raise general cyber resilience to new level
4) Mindset-change: J6  J3 (plans and operations)
5) Develop situational awareness and information sharing
6) Strenghten Alliance´s cyber deterrence
7) Support cyber innovations (defence, intel, offense)
8) Combine cyber and physical capabilities and operations
9) Rethink Article 5
10) Cyberpolitics – to response Russia´s aggressive behavior in cyber domain
Jarno Limnéll
Thank you
“It is not the strongest species that survive, nor the
most intelligent, but the ones responsive to change.”
- Charles Darwin

Weitere ähnliche Inhalte

Was ist angesagt?

Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national security
Talwant Singh
 
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
Pukhraj Singh
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
bl26ehre
 

Was ist angesagt? (20)

Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...
Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...
Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national security
 
Case study 11
Case study 11Case study 11
Case study 11
 
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
 
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South Africa
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South AfricaPukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South Africa
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South Africa
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
 
Understanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj SinghUnderstanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj Singh
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Case study 13
Case study 13Case study 13
Case study 13
 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 

Ähnlich wie Cyberwarfare and Aggressiveness in Cyberspace

Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docx
rtodd599
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
Leslie Lee
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
Andrea Rossetti
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
glendar3
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
todd581
 

Ähnlich wie Cyberwarfare and Aggressiveness in Cyberspace (20)

Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Microsoft Digital Defense Executive Summary-2022
Microsoft Digital Defense Executive Summary-2022Microsoft Digital Defense Executive Summary-2022
Microsoft Digital Defense Executive Summary-2022
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docx
 
Microsoft Digital Defense Report 2022.pdf
Microsoft Digital Defense Report 2022.pdfMicrosoft Digital Defense Report 2022.pdf
Microsoft Digital Defense Report 2022.pdf
 
The Evolution of Cyber Threats: Past, Present, and Future Trends
The Evolution of Cyber Threats: Past, Present, and Future TrendsThe Evolution of Cyber Threats: Past, Present, and Future Trends
The Evolution of Cyber Threats: Past, Present, and Future Trends
 
original.pdf
original.pdforiginal.pdf
original.pdf
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
114-116
114-116114-116
114-116
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber weapons 1632578286
Cyber weapons 1632578286Cyber weapons 1632578286
Cyber weapons 1632578286
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
Cybersecurity and-cyberwar-singer-en-22186
Cybersecurity and-cyberwar-singer-en-22186Cybersecurity and-cyberwar-singer-en-22186
Cybersecurity and-cyberwar-singer-en-22186
 
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
 
Cyber Influence Operations
Cyber Influence OperationsCyber Influence Operations
Cyber Influence Operations
 
Cyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxCyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptx
 
Cyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsCyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber Analysts
 

Kürzlich hochgeladen

Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
amilabibi1
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
raffaeleoman
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
Kayode Fayemi
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
David Celestin
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
Kayode Fayemi
 

Kürzlich hochgeladen (15)

My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 

Cyberwarfare and Aggressiveness in Cyberspace

  • 1. Cyberwarfare and aggressiveness in cyberspace Jarno Limnéll Professor, Cybersecurity, Aalto University VP, Cybersecurity, Insta Group Ltd. Doctor of Military Science @JarnoLim
  • 2. New Normal in Security: Speed of Change Unpredictable Instability Digital-Physical Complexity
  • 3. Cyber is an element in all crisis and wars Evolution – not revolution Cybersabotage has begun to emerge in conflicts
  • 4. “Cyberattack on German steel plant caused significant damage” KINETIC CYBER “A cyber attack on the French television network TV5 Monde” FALSE FLAG ATTACKS “The Dukes: 7 Years of Russian Cyber- Espionage” STRATEGIC CYBER ESPIONAGE “Hackers breach the Warsaw Stock Exchange” CRITICAL INFRASTRUCTURE Russians (and others) are testing the boundaries of the cyberbattlefield.
  • 5.
  • 6. Russia has a wide range of tools and resources, including the ability to carry out denial-of-service attacks, develop sophisticated malware and exploit previously unknown software vulnerabilities. Russian cyber activities are focused mainly on intelligence gathering and military reconnaissance of critical infrastructure networks as advance work for a future conflict.” Most worryingly, today’s intelligence operations enable tomorrow’s military actions.
  • 7. Coordinated December 2015 attack on the Ukrainian electrical grid was clearly an attack on critical national infrastructure. Motive? - Testing and research - Creating deterrence (send a public message) - Revenge (power outage earlier in Crimea)
  • 8. OVERALL CYBER CAPABILITIES (scale 1-10 / offense, defense, dependence) * State Cyber Offense Cyber Defense Cyber Dependence ** Total Iran 4 3 5 12 Estonia 3 8 1 12 Great Britain 7 5 2 14 South Korea 6 5 3 14 North Korea 3 3 9 15 Germany 7 7 2 16 Israel 8 6 3 17 United States 10 5 2 17 China 8 5 4 17 Russia 8 8 3 19 * Analysis is based on information in different public sources * Dependence is a reverse score (more dependent means more vulnerable) Jarno Limnéll
  • 9. Kyberturvallisuuden kokonaisuus 9 Digital security integral part of today´s security: Dependence increases and More sophisticated capabilities being developed. The speed of cyber attacks and their sophistication has changed dramatically.
  • 10. Cybersecurity = Protecting our societies, our businesses and our way of life
  • 11. “Russia and China are the most sophisticated nation-state actors in the new generation of cyberwarfare, and Russian hackers lead in terms of sophistication, programming power and inventiveness.”
  • 12.
  • 14. States consider cyber capabilities as an integral part of operational military capability and are not afraid to employ them. How to integrate cyber capabilities to other capabilities
  • 16. Talented Individuals – Who will have and educate them in constantly changing security?
  • 17. Most valuable skills for cybersecurity career in next years might not be a focus in specific technology, but ability to understand big picture.
  • 18. From Technology- and Control-centric to Humancentric Cybersecurity Future cyberwarfare is less hacking power grids and more "hacking minds" by shaping environment in which political reality takes place.
  • 20. Trend: The world is moving towards a greater strategic use of cyber capabilities to persuade adversaries to change their behavior.
  • 21. Beginning – End Our side – Their side Military – Civilian Involved – Not-involved Win – Lose Violence – Non-violence Dichotomies are blurring SECURITY INSECURITY The lines between cyber activists, criminals and state-paid hackers are becoming increasingly blurred.
  • 22.
  • 23. 1) Defend own networks – improving quality in all member states 2) Increase education and training 3) Raise general cyber resilience to new level 4) Mindset-change: J6  J3 (plans and operations) 5) Develop situational awareness and information sharing 6) Strenghten Alliance´s cyber deterrence 7) Support cyber innovations (defence, intel, offense) 8) Combine cyber and physical capabilities and operations 9) Rethink Article 5 10) Cyberpolitics – to response Russia´s aggressive behavior in cyber domain Jarno Limnéll
  • 24. Thank you “It is not the strongest species that survive, nor the most intelligent, but the ones responsive to change.” - Charles Darwin