Cyber Warfare Is Integral To Modern International Politics

Defacement of Russina Websites by Anonymous Ukraine: sensecy.com

Cyber-operations are being used for a wide range of information warfare and intelligence gathering purposes, including in the war between Russia and Ukraine, according to a new book published today by the NATO Cooperative Cyber Defence Centre of Excellence (CCDCE). http://bit.ly/1IlrfOG

“In Ukraine, cyber-operations have been used hand-in-hand with information warfare and intelligence initiatives,” explained Sven Sakkov, director of the Tallinn-based NATO CCDCE, which has published Cyber War in Perspective: Russian Aggression against Ukraine. 

He adds: “Phone hacks, website defacements, and politically motivated cyber-attacks served a wider purpose. It demonstrates that computer-based warfare is very unlikely to happen in isolation, it is rather integrated into how nations assert power, potentially using any and all means possible.”

“The world is moving toward a greater strategic use of cyber-capabilities to persuade adversaries to change their behaviour,” explains Jarno Limnéll, Professor of cyber-security at Aalto University and one of the authors. “Smaller countries such as Finland and Estonia, with a strong heritage of technical capability and experience, may possess some advantages in the cyber-domain that not even great powers could dream of,” adds Professor Limnéll.

Kenneth Geers, NATO CCD COE Ambassador, Non-Resident Senior Fellow at the Atlantic Council, Visiting Professor at the Taras Shevchenko National University of Kyiv and editor of the publication, describes how, “...more than 20 experts in network security and national defence examine the cyber-dimension of the ongoing geopolitical conflict between Russia and Ukraine, and explain how cyber attacks can influence international crises in the Internet era”.

Over its 18 chapters scholars and practitioners identify the tactical and strategic implications of cyber-operations and discuss their significance for policy and law, and analyse many aspects of information warfare. The Ukraine crisis between 2013-2015 provides a case study to examine digital propaganda, denial-of-service (DoS) campaigns, website defacements, and information leaks by hacktivists, cutting-edge cyber-espionage malware, physical attacks on Internet infrastructure, and even an attempt to spoil the Ukrainian Presidential election.
Ein News: http://bit.ly/1jI6ktt

« IoT Turns Cities Into Cyber Battlegrounds
Prediction Can Replace Prevention As A Security Strategy »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Get Cyber Safe

Get Cyber Safe

Get Cyber Safe is a national public awareness campaign created to educate Canadians about Internet security and the simple steps they can take to protect themselves online.

Pyramid Computer

Pyramid Computer

Pyramid Computer provides custom enterprise solutions for Industrial PC, Imaging, Network, Security, POS, Indoor Positioning and Automation.

Governikus

Governikus

Governikus provides solutions for secure data transport, authentication, the use of electronic signatures and cryptography as well as for long-term storage.

Excelerate Systems

Excelerate Systems

Excelerate Systems is a leading provider of IT services with a focus on Big Data, Cloud Services and Security.

TypingDNA

TypingDNA

TypingDNA uses AI to recognise people by the way they type on desktop keyboards and mobile devices.

Swiss Accreditation Service (SAS)

Swiss Accreditation Service (SAS)

SAS is the national accreditation body for Switzerland. The directory of members provides details of organisations offering certification services for ISO 27001.

CNA Insurance

CNA Insurance

CNA offers a market-leading suite of cyber liability insurance products and risk control resources for businesses of all sizes.

CyberSAFE Malaysia

CyberSAFE Malaysia

CyberSAFE Malaysia is an initiative to educate and enhance the awareness of the general public on the technological and social issues and risks facing internet users.

BLUECYFORCE

BLUECYFORCE

BLUECYFORCE is the leading professional training and cyber defense training organization in France.

FireCompass

FireCompass

FireCompass SAAS platform helps CISOs & Security Teams in continuous risk assessment by mapping your attack surface and knowing the “unknown unknowns”.

Ministry of Information and Communications (MIC) - Vietnam

Ministry of Information and Communications (MIC) - Vietnam

The Ministry of Information & Communications of Vietnam is the policy making and regulatory body in the field of information technology and national information and and communication infrastructure.

Infinidat

Infinidat

Infinidat delivers enterprise-proven solutions for data storage, data protection, business continuity, and sovereign cloud storage.

BlueHalo

BlueHalo

BlueHalo is purpose-built to provide industry capabilities in the domains of Space Superiority and Directed Energy, Missile Defense and C4ISR, and Cyber and Intelligence.

Citizen Lab - University of Toronto

Citizen Lab - University of Toronto

Citizen Lab focuses on research and development at the intersection of cyberspace, global security & human rights.

SharkStriker

SharkStriker

SharkStriker is a US based managed security services provider with SOCs and offices across the globe.

Thoropass

Thoropass

Thoropass (formerly Laika) helps you get and stay compliant with smart software and expert services.