Cyber war: Modern warfare 2.0
This is no game. Call it Modern Warfare 2.0 or call it cyber war, the reality is that everyone is talking about it. But what is cyber war, are we fighting one and how can businesses best protect themselves from the fallout?
Amichai Shulman, CTO of Imperva, agrees that the techniques used for cyber warfare are much the same as used by any hacker, however points out that the attention and focus of the adversary on specific targets is completely different.
"It is important to remember that while hackers are usually focusing on attacking organisations from the outside, governments (or terrorists) engaged in cyber war may choose to attack organisations from the inside through compromised individuals or designated moles," Shulman warns.
Dr Winter is also mindful that there are ways to initiate a cyber attack which do not depend on overtly hostile means, including "various abuses of social networks and spear phishing attacks that introduce the attacker into the victim's systems".
Some appear to prefer the hostile approach, of course, such as Col. Charles W. Williamson III.
A Deputy Staff Judge Advocate at the US Air Forces in Europe's Military Justice Division, Col. Williamson argues the case for an offensive military botnet insisting that it would work in the same way that US conventional weapons dominance deters most of the world from attacking America.
Amrit Williams, CTO at BigFix is not convinced, telling IT PRO that "the concept of an offensive botnet has many drawbacks... and could easily be abused," adding that "in the wrong hands it can be used against the infrastructure it was meant to defend".
Let's not get too bogged down in the detail of who has what weapons and why for now, but instead agree that weapons of mass disruption do exist.
So who are they being aimed at? Dr Winter is adamant that those at greatest risk are "those with the greatest cyber-related infrastructures" and, of course, "the greatest dependency on those infrastructures, that can be used to against them to achieve the greatest impact".
Day agrees that the traditional notion of critical infrastructures targets being the new battleground for hackers is probably the right one.
McAfee's report 'In the Cross fire: Critical Infrastructure Protection in the Age of Cyber war' highlighted how different industries are at a greater level of risk due to their reliance on technology for their everyday running.
In This Article
Managing security risk and compliance in a challenging landscape
How key technology partners grow with your organisationDownload now
Evaluate your order-to-cash process
15 recommended metrics to benchmark your O2C operationsDownload now
AI 360: Hold, fold, or double down?
How AI can benefit your businessDownload now
Getting started with Azure Red Hat OpenShift
A developer’s guide to improving application building and deployment capabilitiesDownload now