The Current Threat Of Global Cyber Warfare

Cyber warfare is a real threat and it is happening now. Government and corporate cyber resources are under attack around the globe. 

Nowhere has this been as apparent than with all the recent news about North Korea. The closed-off country has been making waves in the news recently after being credited for several cyber-attacks on the UK and US throughout November. It is surprising how easy and risk-free this has been for them so far and is a real sign that other countries need to beef-up our cyber security just as much as our physical security.

Of course, North Korea is only the most recent case of cyber warfare in the world. There are many other case studies we can look at from the past. Earlier this year the Department of US Navy was hacked through contractor emails. 134,000 sailors had their personal information and social security numbers stolen. 

This information will likely be sold for use in identity theft. This is not just stealing information to make credit cards and buy stuff on a fictitious account. This hack is more. This is cyber warfare. This hack is compromising the families and distracting the focus of service men and women in the armed forces.

Many divisions of the military have been preparing for Cyber Warfare for years. The People’s Liberation Army Unit 61398 is a division of the Chinese military that is dedicated to hacking corporations and governments around the world. A report by computer security firm Mandiant provided detail on this organisation and, after many diplomatic denials, the Chinese government confirmed the existence of the group.

There were allegations of foreign hacking last year that are still being investigated. This is surrounding the Russian hacking groups that were very active in trying to influence the outcome of the 2016 United States election. This is Cyber Warfare on another scale as one country could manage to manipulate the political climate of a rival country and possibly get away with it entirely.

Cyber warfare is our biggest threat today. It is more effective than blowing up buildings and roads. It is more effective than killing and capturing opposing forces. It is the warfare of the 21st century. It is warfare that captures minds and hearts, not just bodies. The new bombs are fake news, leaked emails and violent propaganda. 

The United States spends hundreds of billions of dollars on new fighter jets, bombs and automatic weapons. Yet, the Marine Corps database, managed on contract with HP, was not secured. This is what allowed SQL injection breach to the Marine Corps Intranet by the Navy hackers noted above.

Two years ago the British Government announced that they would be spending £1.9 billion on cyber security over a 5 year period, effective as of the 1st November, 2016. we have begun to see the effects of this with new cyber security centres being erected and government backed training schemes in cyber security for over 2 million people. 

These are all a step in the right direction but when you compare it to the military budget of 2016, a staggering £35.1 billion, it feels like cyber warfare is not being treated as seriously as it should. 

It does not help that the recent Autumn 2017 budget makes no mention of increases to cyber security or that many UK business’ are actually slashing their cyber defence budgets. Perhaps the recent cyber security attacks will act as a signal that we as a country need to step up our cyber security game.

For the time being, however, it is also important to recognise and act on the urgent need for vigilant management of network security profiles, continuous training, and permanent monitoring and management with tools that are available now.
Tapping links and utilising Firewalls, Intrusion Prevention Systems (IPS), Data Loss Prevention (DLP) and other threat landscape reduction tools are a promising start to deterrence of debilitating breaches from foreign governments as well as domestic hackers. 

Cyber warfare is the new battlefield. It is quiet but effective. It is hidden from public view but very much a public threat. Military investment must maintain our traditional fighting forces but must also support a rapid transition to fighting a new type of war.

Ein News

You Might Also Read: 

Which Countries Are Ready For Cyberwar?:

The Promise & Peril Of Trump’s Cyber Strategy:

Global Cyber Conflict Is Close:

 

 

« 96 Hours To Pay Up Or Spider Ransomware Deletes Your Files
Google To Open An AI Centre In Beijing »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

AtkinsRéalis

AtkinsRéalis

AtkinsRealis is a market-leading design, engineering and project management consultancy operating in fields ranging from infrastructure, through energy and transport to cybersecurity.

Bulb Security

Bulb Security

Whether your internal red team or penetration testing team needs training, or you lack internal resources and need an outsourced penetration test, Bulb Security can help.

SecureAuth

SecureAuth

SecureAuth delivers cutting edge identity and information security solutions for cloud, mobile, web, and VPN systems.

Zayo

Zayo

Zayo is a leading global bandwidth infrastructure services provider for high-performance connectivity, secure colocation and flexible cloud services.

Continuum

Continuum

Continuum is the IT management platform company that allows Managed IT Services Providers to maintain and back up on-premise and cloud-based servers, desktops, mobile devices and other endpoints

Ponemon Institute

Ponemon Institute

Ponemon Institute conducts independent research on data protection and emerging information technologies.

H-ON Consulting

H-ON Consulting

H-ON Consulting develops and applies robust cyber security procedures enabling control systems to be secure.

Fraugster

Fraugster

Fraugster provides the most precise anti-fraud solution for e-commerce businesses.

Haventec

Haventec

Haventec’s internationally patented technologies reduce cyber risk and enable pervasive trust services with a decentralised approach to authentication.

Attack Research

Attack Research

We go far beyond standard tools and scripted tests. Find out if your network or technology can stand real-world and dedicated attackers.

JobStreet.com

JobStreet.com

JobStreet is one of Asia’s leading online employment marketplaces in Malaysia, Philippines, Singapore, Indonesia and Vietnam.

Prima Cyber Solutions (PCS)

Prima Cyber Solutions (PCS)

Prima Cyber Solutions is focused on protecting your business from the massive and devastating impacts that cyber-attacks may cause.

Across Verticals

Across Verticals

Across Verticals is a boutique cyber security consulting firm that specializes in holistic, deeply technical and end to end cyber security advisory services based on industry best practices.

Votiro

Votiro

Votiro is an award-winning cybersecurity company that specializes in file sanitization, ensuring every organization is safe from zero-day and undisclosed attacks.

Ipstack

Ipstack

Ipstack offers one of the leading IP to geolocation APIs and global IP database services worldwide. Protect your site and web application by detecting proxies, crawlers or tor users at first glance.

Lakera

Lakera

Lakera empowers developers and organizations to build GenAI applications without worrying about AI security risks.