Cyber Warfare Is The New Frontier

Cyber warfare is the next frontier of war, where one state uses viruses and hacking to cripple an enemy state’s computer systems, take down their electronic and power systems, removing their ability to access information and communication. Cyber warfare methods have already been used to compromise various countries’ computer systems and infrastructure.

Misinformation campaigns are being widely used across the Internet to influence elections in the UK and US. Alongside the US, Russia, China, Iran and N Korea are among the more prepared nations in terms of cyber warfare capabilities.

This is triggering a cyber arms race, with more than 30 countries trying to develop more advanced capabilities while simultaneously upgrading their defences.

Right now, there is a lack of clear international rules governing the use of cyber weapons. Currently there is disagreement as to what cyberwar actually is and might be in the future. This is broadly similar to the arguments that went on prior to the 1st World War about airplanes and whether they had a credible military function. The initial campaigns of 1914 proved that cavalry could no longer provide the reconnaissance expected by their generals, in the face of the greatly increased firepower of twentieth century armies and it was quickly realised that aircraft could at least locate the enemy.

Since the beginning of the Coronavirus pandemic there has been an upsurge of incidents related to cyber attacks, hacking and data breaches, which highlights that the Internet is not safe. It is imperative to be aware of cyber warfare, as awareness is the first most important step to understanding its implications. Cyber warfare currently refers to cyber-attacks by one country or state against another. However, it can also be an attack by hackers or terrorists aimed at furthering the mission of the individual nation. Government spy agencies are using cyber hacking to view and steal secret data about government intentions. 

Furthermore, cyber attacks can take down a countries electrical and electronic systems and attacks could alter stock prices, knock out emergency services, weaken military responsiveness and disrupt the economy. 

Despite the efforts of the EU tries to obtain a common cyberspace policy and common regulations on the internet,  there are  gaps in the cyber policymaking that leaves the EU nations to cyber threats.  As global tensions grow and cyber weapons mature, it seems evident that this digital iteration of international conflict is occurring with few to no agreed upon (or even informally understood) laws of cyber conflict, increasing uncertainty, the potential for collateral damage, and the likelihood of unintended escalation.

Cyber warfare can be launched instantly, leaving room for speculation and making it difficult to counter. The weapons of cyber war are like those being used by cyber-criminals. It can vary from the very sophisticated to the complete basic. DDoS is one of the unruly weapons. Spear-phishing and social engineering are other standard weapons used to introduce an attacker to the computer of an opponent.

In a cyber war, the chance of early warning is non-existent and it can be very difficult to identify who may have attack ed you. The future of cyber warfare will be determined by two things: 

  • Mindset: The great advances in information and communications technology have an unprecedented impact on our society; a considerable percentage of our life and activities has come to depend heavily on information infrastructure.  This dependence is very much apparent in both the public and private sectors.
  • Technology: Vital factors of public life such as air, road, and railway traffic control, the dissemination of energy like electricity or gas, telecommunication systems, key government sectors such as national defense are now organized and controlled through the use of computers and networked systems. 

Since there is no international law that governs the use of cyber-arms, the legal status of this new frontier is still blurred.

This does not mean that cyber warfare is not covered by the law. The Cooperative Cyber Defence Centre of Excellence (CCDCoE) has released a textbook called Tallinn Manual, which covers the rare but serious cyber-threats. The manual sets out when a cyber-attack is a breach of international law and how nations can respond to such violations.

Under the pressure of cyber warfare, the governments of many countries have unveiled a viable national security policy to ensure the security of their information infrastructure in cyber space. 

Together with the convenience technology has brought, it has also caused a surge in cyber-threats, which tells another story. 

There is no need to stop adopting technology, but we should determine what rules will control its uses. In the same line, cyber warfare is an uncharted area, which will raise risk situations. Only by increasing security and collecting intelligence, new policies to strengthen security practices be built.

Future Technology::      Infosecurity Magazine:    Risk Based Security:       The Cove:     

NextWeb:      HelpNetSecurity:    VHR:       Tech Times:        Wired:    

You Might Also Read: 

The Emerging Domain Of  Cyber War:

 

« How to Transition From Remote Work To A Secure & Agile Workforce
Criminals Have Ramped Up Covid-19 Related Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Hex Security

Hex Security

Hex Security Limited is a specialist Information Assurance (IA) consultancy working with associates and partners to deliver security certification and accreditation support.

Oxford BioChronometrics

Oxford BioChronometrics

By building profiles based on electronically Defined Natural Attributes, or e-DNA, Oxford BioChronometrics protects digital networks, communities, individuals and other online assets from fraud.

Institute for Cybersecurity & Privacy (ICSP) -  University of Georgia

Institute for Cybersecurity & Privacy (ICSP) - University of Georgia

The goal of ICSP is to become a state hub for cybersecurity research and education, including multidisciplinary programs and research opportunities, outreach activities, and industry partnership.

TCDI

TCDI

TCDI specializes in computer forensics, eDiscovery and cybersecurity services.

Office of the National Security Council (UVNS) - Croatia

Office of the National Security Council (UVNS) - Croatia

UVNS coordinates, harmonizes the adoption and controls the implementation of information security measures and standards in the Republic of Croatia.

National Initiative for Cybersecurity Education (NICE)

National Initiative for Cybersecurity Education (NICE)

NICE is a partnership between government, academia, and the private sector focused on cybersecurity education, training, and workforce development.

Binary Defense

Binary Defense

Binary Defense protect businesses of all sizes through advanced cybersecurity solutions including Managed Detection and Response, Security Information and Event Management and Counterintelligence.

DeepView

DeepView

DeepView delivers a unified platform for managing risk on digital platforms. One interactive secure portal allowing employees to engage their networks securely and compliantly.

Adit Ventures

Adit Ventures

Adit Ventures is a venture capital firm with a focus on dynamic growth sectors including AI & Machine Learning, Big Data, Cybersecurity and IoT.

C3i Hub

C3i Hub

C3i Hub aims to address the issue of cyber security of cyber physical systems in its entirety, from analysing security vulnerabilities to developing tools and technologies.

PA Consulting

PA Consulting

PA Consulting Group is a consultancy that specialises in strategy, technology and innovation. Our cyber security experts work with you to spot digital and technology security risks and reduce them.

Exceed Cybersecurity & I.T. Services

Exceed Cybersecurity & I.T. Services

Exceed Cybersecurity & I.T. Services is a premier Managed Internet Technology (I.T.) company with a focus in cybersecurity risk management and CMMC compliance management.

McDonald Hopkins

McDonald Hopkins

McDonald Hopkins is a business advisory and advocacy law firm. We focus on insightful legal solutions that help our clients strategically plan for an increasingly competitive future.

AArete

AArete

AArete is a global management and technology consulting firm specializing in strategic profitability improvement, digital transformation, and advisory services.

Invictus International Consulting

Invictus International Consulting

Invictus International Consulting are a recognized leader in full-spectrum cyber technology solutions designed to protect the security of our nation's global defense and critical infrastructure.

Badge

Badge

Badge authenticates you on-demand for every application, on any device, without storing any secrets.