Cyber Warfare Is The New Frontier

Cyber warfare is the next frontier of war, where one state uses viruses and hacking to cripple an enemy state’s computer systems, take down their electronic and power systems, removing their ability to access information and communication. Cyber warfare methods have already been used to compromise various countries’ computer systems and infrastructure.

Misinformation campaigns are being widely used across the Internet to influence elections in the UK and US. Alongside the US, Russia, China, Iran and N Korea are among the more prepared nations in terms of cyber warfare capabilities.

This is triggering a cyber arms race, with more than 30 countries trying to develop more advanced capabilities while simultaneously upgrading their defences.

Right now, there is a lack of clear international rules governing the use of cyber weapons. Currently there is disagreement as to what cyberwar actually is and might be in the future. This is broadly similar to the arguments that went on prior to the 1st World War about airplanes and whether they had a credible military function. The initial campaigns of 1914 proved that cavalry could no longer provide the reconnaissance expected by their generals, in the face of the greatly increased firepower of twentieth century armies and it was quickly realised that aircraft could at least locate the enemy.

Since the beginning of the Coronavirus pandemic there has been an upsurge of incidents related to cyber attacks, hacking and data breaches, which highlights that the Internet is not safe. It is imperative to be aware of cyber warfare, as awareness is the first most important step to understanding its implications. Cyber warfare currently refers to cyber-attacks by one country or state against another. However, it can also be an attack by hackers or terrorists aimed at furthering the mission of the individual nation. Government spy agencies are using cyber hacking to view and steal secret data about government intentions. 

Furthermore, cyber attacks can take down a countries electrical and electronic systems and attacks could alter stock prices, knock out emergency services, weaken military responsiveness and disrupt the economy. 

Despite the efforts of the EU tries to obtain a common cyberspace policy and common regulations on the internet,  there are  gaps in the cyber policymaking that leaves the EU nations to cyber threats.  As global tensions grow and cyber weapons mature, it seems evident that this digital iteration of international conflict is occurring with few to no agreed upon (or even informally understood) laws of cyber conflict, increasing uncertainty, the potential for collateral damage, and the likelihood of unintended escalation.

Cyber warfare can be launched instantly, leaving room for speculation and making it difficult to counter. The weapons of cyber war are like those being used by cyber-criminals. It can vary from the very sophisticated to the complete basic. DDoS is one of the unruly weapons. Spear-phishing and social engineering are other standard weapons used to introduce an attacker to the computer of an opponent.

In a cyber war, the chance of early warning is non-existent and it can be very difficult to identify who may have attack ed you. The future of cyber warfare will be determined by two things: 

  • Mindset: The great advances in information and communications technology have an unprecedented impact on our society; a considerable percentage of our life and activities has come to depend heavily on information infrastructure.  This dependence is very much apparent in both the public and private sectors.
  • Technology: Vital factors of public life such as air, road, and railway traffic control, the dissemination of energy like electricity or gas, telecommunication systems, key government sectors such as national defense are now organized and controlled through the use of computers and networked systems. 

Since there is no international law that governs the use of cyber-arms, the legal status of this new frontier is still blurred.

This does not mean that cyber warfare is not covered by the law. The Cooperative Cyber Defence Centre of Excellence (CCDCoE) has released a textbook called Tallinn Manual, which covers the rare but serious cyber-threats. The manual sets out when a cyber-attack is a breach of international law and how nations can respond to such violations.

Under the pressure of cyber warfare, the governments of many countries have unveiled a viable national security policy to ensure the security of their information infrastructure in cyber space. 

Together with the convenience technology has brought, it has also caused a surge in cyber-threats, which tells another story. 

There is no need to stop adopting technology, but we should determine what rules will control its uses. In the same line, cyber warfare is an uncharted area, which will raise risk situations. Only by increasing security and collecting intelligence, new policies to strengthen security practices be built.

Future Technology::      Infosecurity Magazine:    Risk Based Security:       The Cove:     

NextWeb:      HelpNetSecurity:    VHR:       Tech Times:        Wired:    

You Might Also Read: 

The Emerging Domain Of  Cyber War:

 

« How to Transition From Remote Work To A Secure & Agile Workforce
Criminals Have Ramped Up Covid-19 Related Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Verisec International

Verisec International

Verisec International AB is a Swedish Tech company focused since inception in enabling Trust in Digital Transactions, through the development of proprietary cutting-edge technologies and services.

Radiant Logic

Radiant Logic

Radiant Logic is a market-leading provider of federated identity solutions based on virtualization, and delivers simple, logical, and standards-based access to all identities within an organization.

WireX Systems

WireX Systems

WireX is an innovative network intelligence and forensics company that is changing the way businesses resolve cyber-attacks.

Duo Security

Duo Security

Duo combines security expertise with a user-centered philosophy to provide two-factor authentication, endpoint remediation and secure single sign-on tools.

Sage Designs

Sage Designs

Sage Designs is a provider of SCADA, Security & Industrial Automation products and training programs.

BA-CSIRT

BA-CSIRT

BA-CSIRT is a center which is dedicated to assist and raise awareness among citizens and the Government of the City of Buenos Aires in everything related to information security.

HCL Technologies

HCL Technologies

HCL offer an integrated portfolio of products, solutions and services built around Digital, IoT, Cloud, Automation, Cybersecurity, Analytics, Infrastructure Management and Engineering Services.

Netragard

Netragard

Netragard has an established reputation for providing high-quality offensive and defensive security services.

Kalima Systems

Kalima Systems

Kalima’s mission is to securely collect, transport, store and share Industrial IoT (IIoT) trusted data in real time with devices, services and mobile workers.

SensCy

SensCy

SensCy is a Trusted Guide for Sensible Cybersecurity for small and medium-sized organizations.

Europol - European Cybercrime Centre (EC3)

Europol - European Cybercrime Centre (EC3)

The European Cybercrime Centre (EC3) was set up by Europol to strengthen the law enforcement response to cybercrime in the EU.

HighGround

HighGround

HighGround offer a Cyber Security Solution for everybody, regardless of skillset, to feel empowered in their security experience in reaching Cyber Resilience.

Incyber

Incyber

Incyber is a fully integrated network and cybersecurity solutions provider contracted to safeguard public and private enterprise, high value data and sensitive industries.

Nukke

Nukke

Nukke offers advanced cybersecurity software and tailored solutions for your business.

Resmo

Resmo

Resmo is an all in one platform for SaaS app and access management for modern IT teams.

iTRUSTXForce

iTRUSTXForce

iTRUSTXForce is a global provider of DigitalX (cybersecurity, privacy, and digital trust) services. We offer comprehensive services that focus on delivering outcomes for our clients.