Cyber Warfare: An Integral Part of Modern Politics

 

Cyber-operations are being used for a wide range of information warfare and intelligence gathering purposes, including in the war between Russia and Ukraine, according to a new book published recently by the NATO Cooperative Cyber Defence Centre of Excellence (CCDCE).

“In Ukraine, cyber-operations have been used hand-in-hand with information warfare and intelligence initiatives,” explained Sven Sakkov, director of the Tallinn-based NATO CCDCE, which has published Cyber War in Perspective: Russian Aggression against Ukraine.

He adds: “Phone hacks, website defacements, and politically motivated cyber-attacks served a wider purpose. It demonstrates that computer-based warfare is very unlikely to happen in isolation, it is rather integrated into how nations assert power, potentially using any and all means possible.”

“The world is moving toward a greater strategic use of cyber-capabilities to persuade adversaries to change their behaviour,” explains Jarno Limnéll, Professor of cyber-security at Aalto University and one of the authors. “Smaller countries such as Finland and Estonia, with a strong heritage of technical capability and experience, may possess some advantages in the cyber-domain that not even great powers could dream of,” adds Professor Limnéll.

Kenneth Geers, NATO CCD COE Ambassador, Non-Resident Senior Fellow at the Atlantic Council, Visiting Professor at the Taras Shevchenko National University of Kyiv and editor of the publication, describes how, “...more than 20 experts in network security and national defence examine the cyber-dimension of the ongoing geopolitical conflict between Russia and Ukraine, and explain how cyber attacks can influence international crises in the Internet era”.

Over its 18 chapters scholars and practitioners identify the tactical and strategic implications of cyber-operations and discuss their significance for policy and law, and analyse many aspects of information warfare. The Ukraine crisis between 2013-2015 provides a case study to examine digital propaganda, denial-of-service (DoS) campaigns, website defacements, and information leaks by hacktivists, cutting-edge cyber-espionage malware, physical attacks on Internet infrastructure, and even an attempt to spoil the Ukrainian Presidential election.

Ein News: http://bit.ly/1RlX6Sj

« The Future Of Healthcare Systems Is ‘Unsexy Plumbing’
Malware Mixed Into A Cyber Threat Cocktail »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

RISA

RISA

RISA solutions help to secure networks, improve overall network security, and achieve government regulatory compliance.

Tufin

Tufin

Tufin enables organizations to automate their security policy visibility, risk management, provisioning and compliance across their multi-vendor, hybrid environment.

Security Industry Association (SIA)

Security Industry Association (SIA)

The SIA's mission is to be a catalyst for success​ within the global security industry through information, insight and influence.

Zivver

Zivver

Zivver is the effortless, secure email platform, powering the next generation of secure communications.

Open Information Security Foundation (OISF)

Open Information Security Foundation (OISF)

OISF is a non-profit organization led by world-class security experts, programmers, and others dedicated to open source security technologies.

TI Safe

TI Safe

TI Safe provide cybersecurity solutions for industrial networks of main critical infrastructures in Latin America.

Pryv

Pryv

Pryv is a Swissmade software for privacy, personal data collection, usage, sharing and storage.

CyberSecurityTrainingCourses.com

CyberSecurityTrainingCourses.com

Cyber Security Training Courses is a portal to help candidates find the best courses to progress their career within the IT security industry.

NTIC Cyber Center

NTIC Cyber Center

NTIC Cyber Center is an organization dedicated to making the National Capital Region (Washington DC) more resilient to cyber-attacks.

Internet Infrastructure Investigation

Internet Infrastructure Investigation

Internet Infrastructure Investigation offers a bespoke Internet Governance Solution to your brands online infringement problems.

1898 & Co

1898 & Co

Keep your critical assets secure with a comprehensive portfolio of services from high-level assessments to fully managed security services designed for operational technology applications.

Securix

Securix

SECURIX AG delivers holistic IT security solutions that are tailored to the specific challenges and requirements of your company.

Privacy Compliance Hub

Privacy Compliance Hub

Privacy Compliance Hub provide an easy to use platform with a comprehensive data protection compliance programme including training, information, templates and reporting.

Ceeyu

Ceeyu

Ceeyu is an all-in-one cybersecurity ratings and third party risk management platform.

CUBE3 AI

CUBE3 AI

CUBE3.AI is a web3 security platform that provides real-time transaction protection for smart contracts, safeguarding against cyber exploits, fraud, and compliance risks.

Fescaro

Fescaro

FESCARO is a trusted cybersecurity partner for global automakers and their partners, helping them transition to software-defined vehicles (SDVs) with tailored automotive software solutions.