Cyberwarfare, which is defined by Clarke (2010) as action by a given nation-state
Author’s Name
Institutional affiliation
Introduction
Cyberwarfare, which is defined by Clarke (2010) as action by a given nation-state to maliciously penetrate another state’s computer networks for the main purpose of disrupting or causing damage is a major cause of national and global concern. This threat, which is often politically motivated, has in this year and for the very first time, been regarded to be a larger threat than terrorism or Al Qaeda by various U.S intelligence authorities (Dilanian, 2013). Computer security is indeed is an important concern for governments, businesses and individuals (OPC, 2011, p.11; Guttman & Roback, 1995). In this paper, we investigate the concept of cyberwarfare and explain why it is an area of concern for governments, businesses and individuals. Also investigated is how individuals attempt to breach computer security in this domain (methods of attack). This paper also presents the active and passive defenses that governments, businesses and individuals can use in combating cyber attack. The methods that security specialists employ in safeguarding computer systems are also explored in great detail.
The concept of cyberwarefare
The concept of cyberwarfare is basically a computer hacking activity which is politically motivated for the sake of espionage and sabotage. It is a special kind of information systems warfare which is sometimes viewed as analogues to the conventional warfare (O’Connel, 2012).As noted earlier, this threat, has in this year and for the very first time, been regarded to be a larger threat than terrorism or Al Qaeda by various U.S intelligence authorities (Dilanian, 2013).Indeed this makes cyberspace the 5th domain of military warfare (Taddeo, 2012, p.209).
So grave is the issue of cyber security that the U.S Department of Defense (DoD) has formally acknowledged it as a new domain in global warfare (Lynn, 2010).Lipman Report clearly indicated that several of United State’s key sectors of the economy as well as other nations are at great risk of cyber attacks. Cyber threats range from those targeting private to public facilities such as banking and financial sectors, transportation, education, medical, and manufacturing and government operations. In this regard, we can safely regard cyberwarfare as an event exhibiting characteristics of a conventional warfare but waged only in the cyberspace.
Methods of attack
According to Andress and Winterfield (2011), individuals and nation-states can use several methods in order to wage a cyber attack. These range from the use of malware, viruses, Distributed-denial of service (DDoS) attacks to the use of electromagnetic pulse (EMP) bombs. Wilson (2008) categorized the methods into three distinct issues; physical damage of computers as well as communication lines, the use of electromagnetic pulse to damage computers and the use of malware to manipulate as well as sabotage computer networks.
Malware attack involves the use of malicious software to infect individual, corporate or government computers. A perfect example of a malware that has been used in the past is Stuxnet, a malware which is arguably the most sophisticated cyberweapon ever designed (Bodenheimer, 2012). This malware was developed by United States in collaboration with Israel in order to sabotage the Iranian nuclear enrichment program. Its deployment was hugely successful to its creator since it completely destroyed the computers that were being used for the enrichment operations.
Physical damage of computers as well as communication lines is another method used in waging a cyber attack. This is usually achieved through the destruction as well as sabotage of computer hardware, aerials, cables as well as satellites. The use of EMP is also effective since it completely destroys all computer and communication equipment that are transistor-based.
Manipulation of computer networks is yet another example of cyberwarfare. It involves the use of programs to interfere with the integrity, availability as well as confidentiality of the computer and communication systems. This type of attack involves the use of DDoS attacks as well as man-in-the-middle attacks.
How to combat cyberwarfare
Cyber attacks can be combated through the application of active and passive anti-cyber attack strategies. There is a need for individuals, corporations and governments to develop methods for predicting, identifying and countering cyber attacks. Currently, several entities within the United States cyber community campaigning for the adoption of an anti-cyber attack campaign that is able to strategically as well as tactically deal with the eminent cyber threats (Menn, 2012). These anti-cyber attack strategies involved the application of active and passive defensive strategies to protect computer and communication systems against cyber attacks. Anti-cyber-attack strategies are mostly associated with both active and passive cyber attack defense measures that are used in protecting computer systems while counter-cyber-attack measures are mainly pre-emptive offensive techniques that are used to analyze behaviors and signatures and then subsequently deter, prevent, pre-empt as well as neutralize all sorts of hostile acts or intrusions (Swanson,Astrich,Robinson,2012).
Individuals, corporations and governments must therefore work together with security specialists in coming up with proper anti and counter-cyber-attack measures in order to ensure that the confidentiality, integrity and availability of computer and communication networks are never compromised. Intrusion detection systems must be used to help in forming a strategy that is more predictive than reactive. An early warning framework such as Lockwood’s 12-step Analytical Method for Prediction (LAMP) must also be implemented (Lockwood, 1996).The use of antivirus updated software such as Kaspersky Antivirus must also be used. Firewall must also be used with suitable policies put in place.
Conclusion
Cyberwarfare is a concept that can never be avoided in our current and future societies. Individuals, corporations and governments must therefore work together with security professionals in combating all sorts of offensive cyberwarfare. Active and passive defense mechanisms must therefore be designed to be used for predicting, identifying and countering cyber attacks. Otherwise, we might just be headed for a cyber Armageddon!
References
Andres,J.,Winterfield.,S. (2011).Cyber Warfare: Techniques, Tactics and Tools for Security
Practitioners. Waltham,MA: Syngress
Bodenheimer,DZ.(2012).Cyberwarfare in the Stuxnet Age Can Cannonball Law Keep Pace
With the Digital Battlefield? The SciTech Lawyer, 8 (3) (Winter,2012).Retrieved on 17 April,2013 from HYPERLINK “http://www.crowell.com/files/2012-bodenheimer-the-scitech-lawyer.pdf” http://www.crowell.com/files/2012-bodenheimer-the-scitech-lawyer.pdf
Clarke, R,A.(2010).Cyber War.New York,NY:Harper Collins
Guttman,B., Roback,EA. (1995). An Introduction to Computer Security: The NIST Handbook.
Nist special Publication800-12. Retrieved on 17 April,2013 from HYPERLINK “http://csrc.nist.gov/publications/nistpubs/800-12/handbook.pdf” http://csrc.nist.gov/publications/nistpubs/800-12/handbook.pdf
Dilanian, K (2013)”Cyber-attacks a bigger threat than Al Qaeda, officials say”, Los Angeles
Times, March 12, 2013. Retrieved on 17 April,2013 HYPERLINK “http://articles.latimes.com/2013/mar/12/world/la-fg-worldwide-threats-20130313” http://articles.latimes.com/2013/mar/12/world/la-fg-worldwide-threats-20130313
Lynn, W.J. ,III. “Defending a New Domain: The Pentagon’s Cyberstrategy”, Foreign Affairs,
Sept/Oct. 2010, pp. 97–108
Lockwood, J. (1996). Lockwood Analytical Method for Prediction, DC: JMIC.
Menn, J. (2012, June 18). “Hacked companies fight cyber criminals.” Retrieved on 17
April,2013 from the Canada.com website: HYPERLINK “http://www.canada.com/technology/Hacked+companies+fight+cyber+criminals/” http://www.canada.com/technology/Hacked+companies+fight+cyber+criminals/
O’Connel,ME (2012).Cyber Security without Cyber War. Oxford :Oxford University Press
Office of the Privacy Commissioner of Canada (2011).
“Fundamental Privacy Rights within a Shared Vision for Perimeter Security and Economic Competitiveness”.Submission by the Office of the Privacy Commissioner of Canada to the Government of Canada’s Beyond the Border Working Group public consultation.
Taddeo, M (2012). “Information Warfare: a Philosophical Perspective.”Presented at the 2012
4th International Conference on Cyber Conflict. Retrieved on 17 April,2013 HYPERLINK “http://www.ccdcoe.org/publications/2012proceedings/3_5_Taddeo_AnAnalysisForAJustCyberWarfare.pdf” http://www.ccdcoe.org/publications/2012proceedings/3_5_Taddeo_AnAnalysisForAJustCyberWarfare.pdf
Wilson,C (2008). Botnets, Cybercrime, and Cyberterrorism:Vulnerabilities and Policy Issues for
Congress.CRS Report for Congress Order Code RL32114.Updated January 28,2008. Retrieved from HYPERLINK “http://www.fas.org/sgp/crs/terror/RL32114.pdf” http://www.fas.org/sgp/crs/terror/RL32114.pdf