SlideShare a Scribd company logo
1 of 9
Download to read offline
1
CYBERWAR
THE NEXT THREAT TO
NATIONAL SECURITY
BY
TALWANT SINGH
DISTRICT & SESSIONS
JUDGE
DELHI (EAST), INDIA
2
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
Cyber War is a powerful but silent threat as the terrorism is, and it is equally dangerous to
our national security. We must know what cyber war is, how cyber weapons work, and how
vulnerable we are as a nation and as individuals to the vast and looming web of cyber
criminals.
Both in and out of government, people sound the alarms about "cyber war" for at least the
last about one decade. Most of the time their grasp of the technical aspects is limited, they
don't have a clear idea about what they're talking about, their scenarios read like movie plots,
and they're usually trying to sell their hardware and software.
In a report of the Group of Ministers of Government of India on National Security titled
“Challenges to the Management of National Security”, it has been observed that:
“The traditional concept of national security has undergone fundamental changes over the
years. It is no longer synonymous with sufficient military strength to defend the nation and
its interests. In today’s world, military might alone does not guarantee either sovereignty
or security. The more realistic and comprehensive approach to national security also
includes economic strength, internal cohesion, and technological prowess. The rapid
technological developments underway at the same time not only facilitate these events by
reducing our reaction time but add entirely new dimensions of threat and challenges, such
as the Revolution in Military Affairs (RMA) and offensive/defensive information warfare.”
Cyber warfare involves units organized along nation-state boundaries, in offensive and
defensive operations, using computers to attack other computers or networks through
electronic means. Hackers and other individuals trained in software programming and
exploiting the intricacies of computer networks are the primary executors of these attacks.
These individuals often operate under the auspices and possibly the support of nation-state
actors. In the future, if not already common practice, individual cyber warfare units will
execute attacks against targets in a cooperative and simultaneous manner.
3
The words “effective cyber attack” by no means translate into the proverbial “take down” of
the Internet; on the contrary, such attacks might involve intrusions into unprotected networks
for the purpose of compromising data tables, degrading communications, interrupting
commerce, or impairing critical infrastructures (such as transportation or medical and
emergency services) in such a way that trust is undermined at the expense of a smoothly
running economy and society.
While the degree of damage that could be caused in a cyber attack bears no resemblance to
an electronic “Pearl Harbor,” inflicting significant economic costs on the public and private
sectors and impairing performance of key infrastructures (via IT networks linked to
embedded computer systems, for example) seem both plausible and realistic.
A cyber attack by enemy nation-states targeting the transportation, communications, or
banking sector computer systems in our country would, at a minimum, entail significant
economic costs that would affect jobs and growth. Cyber attacks could also indirectly lead to
disruptions in daily civilian life that go beyond the level of temporary nuisance to inflict
sustained uncertainty, confusion, and even chaos across significant elements of the
population. In most extreme cases, these disruptions could cause human casualties.
A. METHODS OF CYBER ATTACK:
Cyber attacks occur on a frequent basis and in a near-instantaneous manner; as the world
becomes more connected, more machines and more people will be affected by an attack. In
the months and years to come, cyber attack techniques will evolve even further, exposing
various—and possibly critical—vulnerabilities that have not yet been identified by computer
security experts. Moreover, such attacks could also be coordinated to coincide with physical
assaults, in order to maximize the impact of both.
Till date many times cyber attacks have been used by state actors. In all cases but one (The
Estonia attacks in 2007), the cyber attack was used to enhance a conventional attack. Cyber
war consists of many different threats:
4
(i) Espionage and National Security Breaches:
Cyber espionage is the act or practice of obtaining secrets (sensitive, proprietary or
classified information) from individuals, competitors, rivals, groups, governments
and enemies also for military, political, or economic advantage using illegal
exploitation methods on Internet, networks, software and or computers. Classified
information that is not handled securely can be intercepted and even modified,
making espionage possible from the other side of the world.
(ii) Sabotage:
Military activities that use computers and satellites for coordination are at risk of
equipment disruption. Orders and communications can be intercepted or replaced.
Power, water, fuel, communications, and transportation infrastructure all may be
vulnerable to disruption. The civilian realm is also at risk, as the security breaches
have already gone beyond stolen credit card numbers, and potential targets can
also include the electric power grid, trains, or the stock market.
Operation Aurora was a cyber attack which began in mid-2009 and continued
through December 2009. The attack was first publicly disclosed by Google on
January 12, 2010, in a blog post. In the blog post, Google said the attack originated
in China. The attacks were both sophisticated and well resourced and consistent
with an advanced persistent threat attack. The attack has been aimed at dozens of
other organizations. Official Chinese media responded stating that the incident is
part of a U.S. government conspiracy. The primary goal of the attack was to gain
access to and potentially modify source code repositories at these high tech,
security and defense contractor companies.
In mid July 2010, security experts discovered a malicious software program called
Stuxnet that had infiltrated factory computers and had spread to plants around the
world. It is considered the first attack on critical industrial infrastructure that sits at
the foundation of modern economies.
5
(iii) Attacks on Electrical Power Grid:
The electric power transmission may be a potential target of cyber warfare. The
Government agencies have to work with industry to identify vulnerabilities and to
help industry enhance the security of control system networks and it is to be
ensured that security is to be in built in the next generation of "smart grid"
networks to be developed. One countermeasure would be to disconnect the power
grid from the Internet and run the network on VPN. Massive power outages caused
by a cyber attack could disrupt the economy, distract from a simultaneous military
attack, or create a national trauma. It is enough to remind ourselves that without
electricity, nothing would work: computers, trains, aircraft, hospitals,
telecommunications services, supply systems, etc. Also, in the event of a serious,
targeted attack, and not a simple, temporary malfunction, there is little that the
systems which control energy continuity could do to compensate for the system
being compromised and for damage which could not be repaired within 24 hours,
which would have the domino-effect of causing further blackouts as attempts were
made to make up for the deficit in the supply of electricity.
(iv) Attacks on Electronic Airport, Air Traffic & Airspace Control Systems:
Although under current security procedures it does not seem possible that these
could be used to cause mid -air collisions or other problems for aircraft coming in
to land, it is however highly plausible that these airspace control systems could be
remotely disabled, allowing, for example, carpet bombing of the territory by
hostile aircraft without any early-warning alarms being set off.
(v) Attacks on Electronic Control Systems on Civil And Military Aircrafts:
These systems becoming compromised can cause problems for aircraft during
take-off and landing, in addition to, aircraft falling out of the sky in mid-flight.
Current aeronautic (fly-by-wire) technology, in the event of any problems with the
on-board computer, can irredeemably compromise the safety of the flight and of
the passengers on that flight, giving the pilot very little chance to regain control of
the aircraft.
6
(vi) Attacks on Electronic National Defence Systems:
After infiltrating national defence systems, a „non-willed‟ attack could be launched
(even a simple long-range missile) towards the territory of a specific nation.
(vii) Attacks on Electronic Emergency Management Systems:
This could cause a late response or even the total lack of a response, to
emergencies, with the result that the health and/or lives of one or more citizens
would be put at risk.
(viii) Attacks on Financial and Banking Systems:
Despite not being able to cause the direct loss of human lives, financial and
banking systems control assets so critical to the State that, at all times, they must
be taken into direct consideration while considering effects of cyber war. The
economic or financial collapse of an entire nation, in fact, could easily bring about
collapse of the financial systems of the entire world as the financial systems of the
countries are inter-connected.
B. INCENTIVES TO USE CYBER ATTACKS:
There are any numbers of incentives to use cyber attacks, including economic, industrial, and
military rationales. By way of example:
(i) Huge amount of money in financial transactions and commerce move over a
medium with minimal protection and only sporadic law enforcement—a structure
the most complex the world has ever known.
(ii) Increasing quantities of intellectual property reside on networked systems; and
(iii) Opportunities abound to disrupt military effectiveness and public safety while
maintaining the elements of surprise and anonymity.
C. DEFENDING AGAINST CYBER ATTACKS:
There has not been significant action in the area of defending against concerted cyber attacks.
A clear agenda for defending against cyber attacks which includes a mix of regulation, more
7
technical controls at major network boundaries, and an expanded scope for Government
Agencies to protect the civilian infrastructure too. On the lines of international arms control
treaties, international cyber war treaties could be used to create "rules of the game" for
international war.
Real issue is that in all scenarios there is assumption that every combatant country or entity
has successfully hacked into every network that the other side controls, and left backdoors to
get back in. Further, none of these back doors have been discovered and removed. The
Governments while spending considerable resources could certainly gain access to many
networks in a relatively short period of time, and if they left backdoors some might not be
discovered, if someone left too many backdoors some would certainly be discovered.
Breaking in is not as simple as just pushing a button like it is in the movies- in fact, recent
studies have shown that the average security breach is the result of four separate mistakes.
While mistakes are made all the time (which means that breaches occur all the time,
somewhere), it's much harder to cause breaches in every system you target all at once.
The cyberwar information is a bit scary because, one does not know the extent to which the
Internet connects and controls so many aspects of our daily lives; in business as well as in
our personal lives. More and more machines and appliances are being built with the
capability to "talk" to the manufacturers who make them, a legitimate and smart way to
diagnose problems and download fixes.... but the idea that the new copy machine in an office
might be hacked, and ordered to malfunction to the point that it catches on fire, is unsettling
to say the least.
Cyber war is "actions by a nation-state to penetrate another nation's computers or networks
for the purposes of causing damage or disruption" as defined in “Cyber War: The Next
Threat to National Security and What to Do About It” by Clarke and Knake. We have the
most to lose if and when a major cyber war breaks out, since we are now so utterly dependent
upon digital technologies and networks.
8
D. CO-ORDINATION BETWEEN PRIVATE SECTOR & GOVERNMENT:
ISPs and many other Internet related companies are doing their bit in this field but it is not
enough to ensure fool-proof security against cyber attacks. In reality, these companies have
powerful incentives to make sure that their networks are relatively safe and secure to avoid
costly attacks and retain customers who demand that their online information and activities
should be safe and trouble-free. But concerted efforts are required by all the players in
Internet world to thwart cyber attacks. World over, Government are in the process of
imposing a fairly sweeping set of new rules on ISPs to better secure their networks against
potential attacks. Governments want ISPs to engage in a great deal more network monitoring
(using deep-packet inspection techniques) under threat of legal sanction if things go wrong.
They admit there are corresponding costs and privacy concerns, but largely dismiss them and
essentially asks the ISPs to just get over those concerns in the interest of a safer and more
secure cyberspace.
E. CONTROVERSY OVER TERMS:
There is debate on whether the term "cyber war" is accurate. In October 2011, for instance,
the Journal of Strategic Studies, a leading journal in that field, published an article by
Thomas Rid, "Cyber War Will Not Take Place." An act of cyber war would have to be
potentially lethal, instrumental, and political. Then not one single cyber offense on record
constitutes an act of war on its own. Instead, all politically motivated cyber attacks, Rid
argued, are merely sophisticated versions of three activities that are as old as warfare itself:
sabotage, espionage, and subversion.
Howard Schmidt, an American cyber security expert, argued in March 2010 that "there is no
cyber war... I think that is a terrible metaphor and I think that is a terrible concept. There are
no winners in that environment." Other experts, however, believe that this type of activity
already constitutes a war. The warfare analogy is often seen intended to motivate a
militaristic response when that is not necessarily appropriate.
The European cyber security expert Sandro Gaycken argued for a middle position. He
considers cyber war from a legal perspective an unlikely scenario, due to the reasons lined
9
out by Rid but the situation looks different from a strategic point of view. States have to
consider military-led cyber operations an attractive activity, within and without war, as they
offer a large variety of cheap and risk-free options to weaken other countries and strengthen
their own positions.
F. CONCLUSION:
Considered from a long-term, geo-strategic perspective, cyber offensive operations can
cripple whole economies, change political views, agitate conflicts within or among states,
reduce their military efficiency and equalize the capacities of high-tech nations to that of
low-tech nations, and use access to their critical infrastructures to blackmail them. The
national security perception of cyber war is to be taken seriously by all concerned before it is
too late.
Note: Article is based upon research conducted on the Internet. The article is in public
domain and anybody can freely use it.

More Related Content

What's hot

Information warfare and information operations
Information warfare and information operationsInformation warfare and information operations
Information warfare and information operationsClifford Stone
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliAdv Prashant Mali
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityAdri Jovin
 
War and Technology
War and Technology War and Technology
War and Technology Asjad Ali
 
International Law and National Security
International Law and National SecurityInternational Law and National Security
International Law and National SecurityNilendra Kumar
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Cyber Warfare 4TH edition
Cyber Warfare 4TH editionCyber Warfare 4TH edition
Cyber Warfare 4TH editionJorge Sebastiao
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ssMaira Asif
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)Tughral Yamin
 
Digital diplomacy empowering 21 century diplomat in the conduct of diplomacy
Digital diplomacy empowering 21 century diplomat in the conduct of diplomacyDigital diplomacy empowering 21 century diplomat in the conduct of diplomacy
Digital diplomacy empowering 21 century diplomat in the conduct of diplomacySaeed Al Dhaheri
 

What's hot (20)

Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
 
Information warfare and information operations
Information warfare and information operationsInformation warfare and information operations
Information warfare and information operations
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
War and Technology
War and Technology War and Technology
War and Technology
 
Cyber warfare
Cyber warfareCyber warfare
Cyber warfare
 
International Law and National Security
International Law and National SecurityInternational Law and National Security
International Law and National Security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber Warfare 4TH edition
Cyber Warfare 4TH editionCyber Warfare 4TH edition
Cyber Warfare 4TH edition
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
cyber security
cyber securitycyber security
cyber security
 
Ppt
PptPpt
Ppt
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Cyber security
 Cyber security Cyber security
Cyber security
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)
 
Digital diplomacy empowering 21 century diplomat in the conduct of diplomacy
Digital diplomacy empowering 21 century diplomat in the conduct of diplomacyDigital diplomacy empowering 21 century diplomat in the conduct of diplomacy
Digital diplomacy empowering 21 century diplomat in the conduct of diplomacy
 

Viewers also liked

Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national securityTalwant Singh
 
Judicial Appreciation of Digital Evidence 2016
Judicial Appreciation of Digital Evidence 2016Judicial Appreciation of Digital Evidence 2016
Judicial Appreciation of Digital Evidence 2016Talwant Singh
 
VV Mineral Sillimanite Is Considered Outstanding, Globally
VV Mineral Sillimanite Is Considered Outstanding, GloballyVV Mineral Sillimanite Is Considered Outstanding, Globally
VV Mineral Sillimanite Is Considered Outstanding, Globallyshiva rajan
 
VV Minerals Asked To Re-submit The Draft Scheme
VV Minerals Asked To Re-submit The Draft SchemeVV Minerals Asked To Re-submit The Draft Scheme
VV Minerals Asked To Re-submit The Draft Schemeshiva rajan
 
Popat and kotecha_property_vs_state_bank_of_india_staff_..._on_29_august,_2005
Popat and kotecha_property_vs_state_bank_of_india_staff_..._on_29_august,_2005Popat and kotecha_property_vs_state_bank_of_india_staff_..._on_29_august,_2005
Popat and kotecha_property_vs_state_bank_of_india_staff_..._on_29_august,_2005chithra venkatesan
 
E-Justice: The Road Map
E-Justice: The Road MapE-Justice: The Road Map
E-Justice: The Road MapTalwant Singh
 
VV Mineral Vaikundarajan Claims Illegal Mining Charges Against Company Are Ba...
VV Mineral Vaikundarajan Claims Illegal Mining Charges Against Company Are Ba...VV Mineral Vaikundarajan Claims Illegal Mining Charges Against Company Are Ba...
VV Mineral Vaikundarajan Claims Illegal Mining Charges Against Company Are Ba...shiva rajan
 
We Have The Legal Documents To Mine And Export VV Minerals India
We Have The Legal Documents To Mine And Export VV Minerals IndiaWe Have The Legal Documents To Mine And Export VV Minerals India
We Have The Legal Documents To Mine And Export VV Minerals Indiashiva rajan
 
Will Soon Be Cleared Of All Allegations Says VV Minerals
Will Soon Be Cleared Of All Allegations Says VV MineralsWill Soon Be Cleared Of All Allegations Says VV Minerals
Will Soon Be Cleared Of All Allegations Says VV Mineralsshiva rajan
 
Ict in the district courts
Ict in the district courtsIct in the district courts
Ict in the district courtsTalwant Singh
 
VV Mineral Shows Faith In Judiciary, Expects Results In Company’s Favour
VV Mineral Shows Faith In Judiciary, Expects Results In Company’s FavourVV Mineral Shows Faith In Judiciary, Expects Results In Company’s Favour
VV Mineral Shows Faith In Judiciary, Expects Results In Company’s Favourshiva rajan
 
Recent trends in use of ict in courts
Recent trends in use of ict in courtsRecent trends in use of ict in courts
Recent trends in use of ict in courtsTalwant Singh
 
“We Are Not Monopolising The Mining Industry, Just Forerunning It”, Says VV M...
“We Are Not Monopolising The Mining Industry, Just Forerunning It”, Says VV M...“We Are Not Monopolising The Mining Industry, Just Forerunning It”, Says VV M...
“We Are Not Monopolising The Mining Industry, Just Forerunning It”, Says VV M...shiva rajan
 
RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARTalwant Singh
 

Viewers also liked (20)

Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national security
 
Judicial Appreciation of Digital Evidence 2016
Judicial Appreciation of Digital Evidence 2016Judicial Appreciation of Digital Evidence 2016
Judicial Appreciation of Digital Evidence 2016
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
VV Mineral Sillimanite Is Considered Outstanding, Globally
VV Mineral Sillimanite Is Considered Outstanding, GloballyVV Mineral Sillimanite Is Considered Outstanding, Globally
VV Mineral Sillimanite Is Considered Outstanding, Globally
 
VV Minerals Asked To Re-submit The Draft Scheme
VV Minerals Asked To Re-submit The Draft SchemeVV Minerals Asked To Re-submit The Draft Scheme
VV Minerals Asked To Re-submit The Draft Scheme
 
Popat and kotecha_property_vs_state_bank_of_india_staff_..._on_29_august,_2005
Popat and kotecha_property_vs_state_bank_of_india_staff_..._on_29_august,_2005Popat and kotecha_property_vs_state_bank_of_india_staff_..._on_29_august,_2005
Popat and kotecha_property_vs_state_bank_of_india_staff_..._on_29_august,_2005
 
Justice of peace
Justice of peaceJustice of peace
Justice of peace
 
E-Justice: The Road Map
E-Justice: The Road MapE-Justice: The Road Map
E-Justice: The Road Map
 
At&t v saudi cable case
At&t v saudi cable caseAt&t v saudi cable case
At&t v saudi cable case
 
VV Mineral Vaikundarajan Claims Illegal Mining Charges Against Company Are Ba...
VV Mineral Vaikundarajan Claims Illegal Mining Charges Against Company Are Ba...VV Mineral Vaikundarajan Claims Illegal Mining Charges Against Company Are Ba...
VV Mineral Vaikundarajan Claims Illegal Mining Charges Against Company Are Ba...
 
We Have The Legal Documents To Mine And Export VV Minerals India
We Have The Legal Documents To Mine And Export VV Minerals IndiaWe Have The Legal Documents To Mine And Export VV Minerals India
We Have The Legal Documents To Mine And Export VV Minerals India
 
Will Soon Be Cleared Of All Allegations Says VV Minerals
Will Soon Be Cleared Of All Allegations Says VV MineralsWill Soon Be Cleared Of All Allegations Says VV Minerals
Will Soon Be Cleared Of All Allegations Says VV Minerals
 
Truncated tribunal
Truncated tribunalTruncated tribunal
Truncated tribunal
 
Ict in the district courts
Ict in the district courtsIct in the district courts
Ict in the district courts
 
VV Mineral Shows Faith In Judiciary, Expects Results In Company’s Favour
VV Mineral Shows Faith In Judiciary, Expects Results In Company’s FavourVV Mineral Shows Faith In Judiciary, Expects Results In Company’s Favour
VV Mineral Shows Faith In Judiciary, Expects Results In Company’s Favour
 
Unpublished record
Unpublished recordUnpublished record
Unpublished record
 
Doctrine of separability
Doctrine of separabilityDoctrine of separability
Doctrine of separability
 
Recent trends in use of ict in courts
Recent trends in use of ict in courtsRecent trends in use of ict in courts
Recent trends in use of ict in courts
 
“We Are Not Monopolising The Mining Industry, Just Forerunning It”, Says VV M...
“We Are Not Monopolising The Mining Industry, Just Forerunning It”, Says VV M...“We Are Not Monopolising The Mining Industry, Just Forerunning It”, Says VV M...
“We Are Not Monopolising The Mining Industry, Just Forerunning It”, Says VV M...
 
RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWAR
 

Similar to CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY

Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonEljay Robertson
 
Digital danger zone tackling cyber security
Digital danger zone tackling cyber securityDigital danger zone tackling cyber security
Digital danger zone tackling cyber securityJohn Kingsley
 
Digital danger zone tackling cyber security
Digital danger zone tackling cyber securityDigital danger zone tackling cyber security
Digital danger zone tackling cyber securityiFluidsEng
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionWilliam McBorrough
 
Information warfare, assurance and security in the energy sectors
Information warfare, assurance  and security in the energy sectorsInformation warfare, assurance  and security in the energy sectors
Information warfare, assurance and security in the energy sectorsLove Steven
 
Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017NgocHaBui1
 
Strengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfStrengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfssuserc1c354
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesblogzilla
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity riskblogzilla
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionWilliam McBorrough
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docxalinainglis
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityAndrea Rossetti
 
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...Fas (Feisal) Mosleh
 
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYTHE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYijcsit
 

Similar to CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY (20)

114-116
114-116114-116
114-116
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
 
Digital danger zone tackling cyber security
Digital danger zone tackling cyber securityDigital danger zone tackling cyber security
Digital danger zone tackling cyber security
 
Digital danger zone tackling cyber security
Digital danger zone tackling cyber securityDigital danger zone tackling cyber security
Digital danger zone tackling cyber security
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
Information warfare, assurance and security in the energy sectors
Information warfare, assurance  and security in the energy sectorsInformation warfare, assurance  and security in the energy sectors
Information warfare, assurance and security in the energy sectors
 
Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017
 
Strengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfStrengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdf
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
 
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYTHE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
 
The Professionalization of the Hacker Industry
The Professionalization of the Hacker IndustryThe Professionalization of the Hacker Industry
The Professionalization of the Hacker Industry
 

More from Talwant Singh

ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018Talwant Singh
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & PrecautionsTalwant Singh
 
Role of Training and Development in Courts
Role of Training and Development in CourtsRole of Training and Development in Courts
Role of Training and Development in CourtsTalwant Singh
 
Change Management in Judiciary
Change Management in JudiciaryChange Management in Judiciary
Change Management in JudiciaryTalwant Singh
 
Appreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan LawAppreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan LawTalwant Singh
 
HRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARYHRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARYTalwant Singh
 
Safe harbour protection_for_mobile_service_pro
Safe harbour protection_for_mobile_service_proSafe harbour protection_for_mobile_service_pro
Safe harbour protection_for_mobile_service_proTalwant Singh
 
Appreciation of Electronic Evidence-PDF
Appreciation of Electronic Evidence-PDFAppreciation of Electronic Evidence-PDF
Appreciation of Electronic Evidence-PDFTalwant Singh
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technologyTalwant Singh
 
Jurisdictional Issues In Internet Disputes
Jurisdictional Issues  In Internet DisputesJurisdictional Issues  In Internet Disputes
Jurisdictional Issues In Internet DisputesTalwant Singh
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An OverviewTalwant Singh
 
Impact Of ICT on Justice Delivery System
Impact Of ICT on Justice Delivery SystemImpact Of ICT on Justice Delivery System
Impact Of ICT on Justice Delivery SystemTalwant Singh
 
Indian Legal System An Introduction
Indian Legal System  An IntroductionIndian Legal System  An Introduction
Indian Legal System An IntroductionTalwant Singh
 
Legal Education & ICT
Legal Education & ICTLegal Education & ICT
Legal Education & ICTTalwant Singh
 

More from Talwant Singh (15)

ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
 
Role of Training and Development in Courts
Role of Training and Development in CourtsRole of Training and Development in Courts
Role of Training and Development in Courts
 
Change Management in Judiciary
Change Management in JudiciaryChange Management in Judiciary
Change Management in Judiciary
 
Appreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan LawAppreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan Law
 
HRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARYHRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARY
 
Safe harbour protection_for_mobile_service_pro
Safe harbour protection_for_mobile_service_proSafe harbour protection_for_mobile_service_pro
Safe harbour protection_for_mobile_service_pro
 
Appreciation of Electronic Evidence-PDF
Appreciation of Electronic Evidence-PDFAppreciation of Electronic Evidence-PDF
Appreciation of Electronic Evidence-PDF
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
Jurisdictional Issues In Internet Disputes
Jurisdictional Issues  In Internet DisputesJurisdictional Issues  In Internet Disputes
Jurisdictional Issues In Internet Disputes
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Impact Of ICT on Justice Delivery System
Impact Of ICT on Justice Delivery SystemImpact Of ICT on Justice Delivery System
Impact Of ICT on Justice Delivery System
 
Indian Legal System An Introduction
Indian Legal System  An IntroductionIndian Legal System  An Introduction
Indian Legal System An Introduction
 
Legal Education & ICT
Legal Education & ICTLegal Education & ICT
Legal Education & ICT
 

Recently uploaded

(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 

Recently uploaded (20)

(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 

CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY

  • 1. 1 CYBERWAR THE NEXT THREAT TO NATIONAL SECURITY BY TALWANT SINGH DISTRICT & SESSIONS JUDGE DELHI (EAST), INDIA
  • 2. 2 CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY Cyber War is a powerful but silent threat as the terrorism is, and it is equally dangerous to our national security. We must know what cyber war is, how cyber weapons work, and how vulnerable we are as a nation and as individuals to the vast and looming web of cyber criminals. Both in and out of government, people sound the alarms about "cyber war" for at least the last about one decade. Most of the time their grasp of the technical aspects is limited, they don't have a clear idea about what they're talking about, their scenarios read like movie plots, and they're usually trying to sell their hardware and software. In a report of the Group of Ministers of Government of India on National Security titled “Challenges to the Management of National Security”, it has been observed that: “The traditional concept of national security has undergone fundamental changes over the years. It is no longer synonymous with sufficient military strength to defend the nation and its interests. In today’s world, military might alone does not guarantee either sovereignty or security. The more realistic and comprehensive approach to national security also includes economic strength, internal cohesion, and technological prowess. The rapid technological developments underway at the same time not only facilitate these events by reducing our reaction time but add entirely new dimensions of threat and challenges, such as the Revolution in Military Affairs (RMA) and offensive/defensive information warfare.” Cyber warfare involves units organized along nation-state boundaries, in offensive and defensive operations, using computers to attack other computers or networks through electronic means. Hackers and other individuals trained in software programming and exploiting the intricacies of computer networks are the primary executors of these attacks. These individuals often operate under the auspices and possibly the support of nation-state actors. In the future, if not already common practice, individual cyber warfare units will execute attacks against targets in a cooperative and simultaneous manner.
  • 3. 3 The words “effective cyber attack” by no means translate into the proverbial “take down” of the Internet; on the contrary, such attacks might involve intrusions into unprotected networks for the purpose of compromising data tables, degrading communications, interrupting commerce, or impairing critical infrastructures (such as transportation or medical and emergency services) in such a way that trust is undermined at the expense of a smoothly running economy and society. While the degree of damage that could be caused in a cyber attack bears no resemblance to an electronic “Pearl Harbor,” inflicting significant economic costs on the public and private sectors and impairing performance of key infrastructures (via IT networks linked to embedded computer systems, for example) seem both plausible and realistic. A cyber attack by enemy nation-states targeting the transportation, communications, or banking sector computer systems in our country would, at a minimum, entail significant economic costs that would affect jobs and growth. Cyber attacks could also indirectly lead to disruptions in daily civilian life that go beyond the level of temporary nuisance to inflict sustained uncertainty, confusion, and even chaos across significant elements of the population. In most extreme cases, these disruptions could cause human casualties. A. METHODS OF CYBER ATTACK: Cyber attacks occur on a frequent basis and in a near-instantaneous manner; as the world becomes more connected, more machines and more people will be affected by an attack. In the months and years to come, cyber attack techniques will evolve even further, exposing various—and possibly critical—vulnerabilities that have not yet been identified by computer security experts. Moreover, such attacks could also be coordinated to coincide with physical assaults, in order to maximize the impact of both. Till date many times cyber attacks have been used by state actors. In all cases but one (The Estonia attacks in 2007), the cyber attack was used to enhance a conventional attack. Cyber war consists of many different threats:
  • 4. 4 (i) Espionage and National Security Breaches: Cyber espionage is the act or practice of obtaining secrets (sensitive, proprietary or classified information) from individuals, competitors, rivals, groups, governments and enemies also for military, political, or economic advantage using illegal exploitation methods on Internet, networks, software and or computers. Classified information that is not handled securely can be intercepted and even modified, making espionage possible from the other side of the world. (ii) Sabotage: Military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to disruption. The civilian realm is also at risk, as the security breaches have already gone beyond stolen credit card numbers, and potential targets can also include the electric power grid, trains, or the stock market. Operation Aurora was a cyber attack which began in mid-2009 and continued through December 2009. The attack was first publicly disclosed by Google on January 12, 2010, in a blog post. In the blog post, Google said the attack originated in China. The attacks were both sophisticated and well resourced and consistent with an advanced persistent threat attack. The attack has been aimed at dozens of other organizations. Official Chinese media responded stating that the incident is part of a U.S. government conspiracy. The primary goal of the attack was to gain access to and potentially modify source code repositories at these high tech, security and defense contractor companies. In mid July 2010, security experts discovered a malicious software program called Stuxnet that had infiltrated factory computers and had spread to plants around the world. It is considered the first attack on critical industrial infrastructure that sits at the foundation of modern economies.
  • 5. 5 (iii) Attacks on Electrical Power Grid: The electric power transmission may be a potential target of cyber warfare. The Government agencies have to work with industry to identify vulnerabilities and to help industry enhance the security of control system networks and it is to be ensured that security is to be in built in the next generation of "smart grid" networks to be developed. One countermeasure would be to disconnect the power grid from the Internet and run the network on VPN. Massive power outages caused by a cyber attack could disrupt the economy, distract from a simultaneous military attack, or create a national trauma. It is enough to remind ourselves that without electricity, nothing would work: computers, trains, aircraft, hospitals, telecommunications services, supply systems, etc. Also, in the event of a serious, targeted attack, and not a simple, temporary malfunction, there is little that the systems which control energy continuity could do to compensate for the system being compromised and for damage which could not be repaired within 24 hours, which would have the domino-effect of causing further blackouts as attempts were made to make up for the deficit in the supply of electricity. (iv) Attacks on Electronic Airport, Air Traffic & Airspace Control Systems: Although under current security procedures it does not seem possible that these could be used to cause mid -air collisions or other problems for aircraft coming in to land, it is however highly plausible that these airspace control systems could be remotely disabled, allowing, for example, carpet bombing of the territory by hostile aircraft without any early-warning alarms being set off. (v) Attacks on Electronic Control Systems on Civil And Military Aircrafts: These systems becoming compromised can cause problems for aircraft during take-off and landing, in addition to, aircraft falling out of the sky in mid-flight. Current aeronautic (fly-by-wire) technology, in the event of any problems with the on-board computer, can irredeemably compromise the safety of the flight and of the passengers on that flight, giving the pilot very little chance to regain control of the aircraft.
  • 6. 6 (vi) Attacks on Electronic National Defence Systems: After infiltrating national defence systems, a „non-willed‟ attack could be launched (even a simple long-range missile) towards the territory of a specific nation. (vii) Attacks on Electronic Emergency Management Systems: This could cause a late response or even the total lack of a response, to emergencies, with the result that the health and/or lives of one or more citizens would be put at risk. (viii) Attacks on Financial and Banking Systems: Despite not being able to cause the direct loss of human lives, financial and banking systems control assets so critical to the State that, at all times, they must be taken into direct consideration while considering effects of cyber war. The economic or financial collapse of an entire nation, in fact, could easily bring about collapse of the financial systems of the entire world as the financial systems of the countries are inter-connected. B. INCENTIVES TO USE CYBER ATTACKS: There are any numbers of incentives to use cyber attacks, including economic, industrial, and military rationales. By way of example: (i) Huge amount of money in financial transactions and commerce move over a medium with minimal protection and only sporadic law enforcement—a structure the most complex the world has ever known. (ii) Increasing quantities of intellectual property reside on networked systems; and (iii) Opportunities abound to disrupt military effectiveness and public safety while maintaining the elements of surprise and anonymity. C. DEFENDING AGAINST CYBER ATTACKS: There has not been significant action in the area of defending against concerted cyber attacks. A clear agenda for defending against cyber attacks which includes a mix of regulation, more
  • 7. 7 technical controls at major network boundaries, and an expanded scope for Government Agencies to protect the civilian infrastructure too. On the lines of international arms control treaties, international cyber war treaties could be used to create "rules of the game" for international war. Real issue is that in all scenarios there is assumption that every combatant country or entity has successfully hacked into every network that the other side controls, and left backdoors to get back in. Further, none of these back doors have been discovered and removed. The Governments while spending considerable resources could certainly gain access to many networks in a relatively short period of time, and if they left backdoors some might not be discovered, if someone left too many backdoors some would certainly be discovered. Breaking in is not as simple as just pushing a button like it is in the movies- in fact, recent studies have shown that the average security breach is the result of four separate mistakes. While mistakes are made all the time (which means that breaches occur all the time, somewhere), it's much harder to cause breaches in every system you target all at once. The cyberwar information is a bit scary because, one does not know the extent to which the Internet connects and controls so many aspects of our daily lives; in business as well as in our personal lives. More and more machines and appliances are being built with the capability to "talk" to the manufacturers who make them, a legitimate and smart way to diagnose problems and download fixes.... but the idea that the new copy machine in an office might be hacked, and ordered to malfunction to the point that it catches on fire, is unsettling to say the least. Cyber war is "actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption" as defined in “Cyber War: The Next Threat to National Security and What to Do About It” by Clarke and Knake. We have the most to lose if and when a major cyber war breaks out, since we are now so utterly dependent upon digital technologies and networks.
  • 8. 8 D. CO-ORDINATION BETWEEN PRIVATE SECTOR & GOVERNMENT: ISPs and many other Internet related companies are doing their bit in this field but it is not enough to ensure fool-proof security against cyber attacks. In reality, these companies have powerful incentives to make sure that their networks are relatively safe and secure to avoid costly attacks and retain customers who demand that their online information and activities should be safe and trouble-free. But concerted efforts are required by all the players in Internet world to thwart cyber attacks. World over, Government are in the process of imposing a fairly sweeping set of new rules on ISPs to better secure their networks against potential attacks. Governments want ISPs to engage in a great deal more network monitoring (using deep-packet inspection techniques) under threat of legal sanction if things go wrong. They admit there are corresponding costs and privacy concerns, but largely dismiss them and essentially asks the ISPs to just get over those concerns in the interest of a safer and more secure cyberspace. E. CONTROVERSY OVER TERMS: There is debate on whether the term "cyber war" is accurate. In October 2011, for instance, the Journal of Strategic Studies, a leading journal in that field, published an article by Thomas Rid, "Cyber War Will Not Take Place." An act of cyber war would have to be potentially lethal, instrumental, and political. Then not one single cyber offense on record constitutes an act of war on its own. Instead, all politically motivated cyber attacks, Rid argued, are merely sophisticated versions of three activities that are as old as warfare itself: sabotage, espionage, and subversion. Howard Schmidt, an American cyber security expert, argued in March 2010 that "there is no cyber war... I think that is a terrible metaphor and I think that is a terrible concept. There are no winners in that environment." Other experts, however, believe that this type of activity already constitutes a war. The warfare analogy is often seen intended to motivate a militaristic response when that is not necessarily appropriate. The European cyber security expert Sandro Gaycken argued for a middle position. He considers cyber war from a legal perspective an unlikely scenario, due to the reasons lined
  • 9. 9 out by Rid but the situation looks different from a strategic point of view. States have to consider military-led cyber operations an attractive activity, within and without war, as they offer a large variety of cheap and risk-free options to weaken other countries and strengthen their own positions. F. CONCLUSION: Considered from a long-term, geo-strategic perspective, cyber offensive operations can cripple whole economies, change political views, agitate conflicts within or among states, reduce their military efficiency and equalize the capacities of high-tech nations to that of low-tech nations, and use access to their critical infrastructures to blackmail them. The national security perception of cyber war is to be taken seriously by all concerned before it is too late. Note: Article is based upon research conducted on the Internet. The article is in public domain and anybody can freely use it.