Cyber Warfare: An Integral Part of Modern Politics

 

Cyber-operations are being used for a wide range of information warfare and intelligence gathering purposes, including in the war between Russia and Ukraine, according to a new book published recently by the NATO Cooperative Cyber Defence Centre of Excellence (CCDCE).

“In Ukraine, cyber-operations have been used hand-in-hand with information warfare and intelligence initiatives,” explained Sven Sakkov, director of the Tallinn-based NATO CCDCE, which has published Cyber War in Perspective: Russian Aggression against Ukraine.

He adds: “Phone hacks, website defacements, and politically motivated cyber-attacks served a wider purpose. It demonstrates that computer-based warfare is very unlikely to happen in isolation, it is rather integrated into how nations assert power, potentially using any and all means possible.”

“The world is moving toward a greater strategic use of cyber-capabilities to persuade adversaries to change their behaviour,” explains Jarno Limnéll, Professor of cyber-security at Aalto University and one of the authors. “Smaller countries such as Finland and Estonia, with a strong heritage of technical capability and experience, may possess some advantages in the cyber-domain that not even great powers could dream of,” adds Professor Limnéll.

Kenneth Geers, NATO CCD COE Ambassador, Non-Resident Senior Fellow at the Atlantic Council, Visiting Professor at the Taras Shevchenko National University of Kyiv and editor of the publication, describes how, “...more than 20 experts in network security and national defence examine the cyber-dimension of the ongoing geopolitical conflict between Russia and Ukraine, and explain how cyber attacks can influence international crises in the Internet era”.

Over its 18 chapters scholars and practitioners identify the tactical and strategic implications of cyber-operations and discuss their significance for policy and law, and analyse many aspects of information warfare. The Ukraine crisis between 2013-2015 provides a case study to examine digital propaganda, denial-of-service (DoS) campaigns, website defacements, and information leaks by hacktivists, cutting-edge cyber-espionage malware, physical attacks on Internet infrastructure, and even an attempt to spoil the Ukrainian Presidential election.

Ein News: http://bit.ly/1RlX6Sj

« The Future Of Healthcare Systems Is ‘Unsexy Plumbing’
Malware Mixed Into A Cyber Threat Cocktail »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Egerie

Egerie

EGERIE's RiskManager solution provides a Global, Centralized, and Updated view of risk maps and security measures for your company.

WWPass

WWPass

WWPass is a global cybersecurity company that provides password-less authentication and client-side encryption technology.

Argo Group

Argo Group

Argo is an international underwriter of specialty insurance. Argo Cyber offers a full spectrum of coverage solutions related to professional and technology services.

Adarma Security

Adarma Security

Adarma are specialists in threat management including SOC design, build & operation.

Bionic

Bionic

Bionic is an agentless way to get control over your increasingly complex applications so you can manage, operate, and secure them faster and more efficiently.

MetaCert

MetaCert

MetaCert’s Zero Trust browser software reduces the risk of organizations being compromised with a phishing-led cyberattack by more than 98%.

Cyber Security Cooperative Research Centre (CSCRC)

Cyber Security Cooperative Research Centre (CSCRC)

The CSCRC provides frank and fearless research and in-depth analysis of cyber security systems, the cyber ecosystem and cyber threats.

Apono

Apono

Apono enables DevOps and security teams to manage access to sensitive cloud assets and data repositories in a frictionless and compliant way.

RankedRight

RankedRight

RankedRight empowers security teams to take immediate action on their most critical risks.

Pulsant

Pulsant

Pulsant is the UK’s premier digital edge infrastructure company providing next-generation cloud, colocation and connectivity services.

Heron Technology

Heron Technology

Heron Technology are a technology solutions consultancy with core competencies in the areas of Cyber Security and Digital Aviation.

Entech

Entech

Entech is a managed IT service provider. We work behind the scenes on your network to ensure data security and integrity.

Xact IT Solutions

Xact IT Solutions

Xact IT Solutions are a certified cybersecurity firm offering cybersecurity, compliance and managed services.

Backblaze

Backblaze

The Backblaze Storage Cloud provides a foundation for businesses, developers, IT professionals, and individuals to build applications, host content, manage media, back up and archive data, and more.

Intracis

Intracis

Intracis is a 'Made in India' cyber incident management solution aimed at ‘Making Security Simple’ by simplifying cyber incident management for CERTS and CSIRTS.

Career Smarter

Career Smarter

Career Smarter offers accredited online courses in cybersecurity and other sectors, helping learners gain industry-recognised certifications.