Thursday, July 26, 2007

How far could cyber war go?

Network World

Security Strategies




Network World's Security Strategies Newsletter, 07/26/07

How far could cyber war go?

By M. E. Kabay

Regular readers may know that I have a longstanding interest in information warfare. I was reviewing materials that might be useful in a new elective graduate course for the Norwich University MSIA program that my friend and colleague Peter Stephenson is planning for us and ran across a couple of interesting articles that are available on the Web for anyone to read. I’ll review the first in this column and the second in the next.

In _NATO Review_ for Winter 2001/2002, Timothy Shimeall (at that time a senior analyst with the Computer Emergency Response Team - CERT - Analysis Center), Phil Williams (a former NATO Fellow and a professor at the University of Pittsburgh) and Casey Dunleavy (former intelligence analyst and director of the CERT Analysis Center) argued that “defence planning has to incorporate the virtual world to limit physical damage in the real.”

The authors dismiss Web vandalism as “a form of harassment or graffiti and not as cyber war _per se_.” They distinguish among three major levels of cyber war: “cyber war as an adjunct to military operations; limited cyber war; and unrestricted cyber war.”

Optimize Your WAN: Network World Shows You How

In this Executive Guide learn how optimization can supercharge your WAN.

Click Here

The first category focuses on “achieving information superiority or information dominance in the battle space.” I would put it this way: This form of cyber war involves physical or cyber attacks directed at military cyber targets and is intended to interfere with C4I (command, control, communications, computing and intelligence).

Limited cyber war focuses cyberattack tools on cybernetic targets with few real-world modalities but with real-world consequences. Vectors for attacks could include networks, malware, denial-of-service techniques, and data distortions useful in psychological operations, economic warfare and other forms of aggression.

“Unrestricted cyber war” is, in the view of the three authors, “More serious, and perhaps more likely, than limited cyber war.” This form of information-based warfare makes “no distinctions between military and civilian targets” and may have distinct physical repercussions “from attacks deliberately intended to create mayhem and destruction.”

Targets could include any part of the critical infrastructure: “energy, transportation, finance, water, communications, emergency services and the information infrastructure itself.” Such attacks could easily result in physical harm and even death to members of the civilian population. For example, the authors suggest, a denial-of-service attack on, say the electrical power grid could cause massive disruption and danger and also potentially lead to destabilization of civil order as the population lost confidence in government structures.

The authors make the following recommendations (with much detail that I am not presenting):

1. Improve “anticipation and assessment”;
2. Improve “preventive or deterrent measures”;
3. Improve “defensive measures”;
4. Improve “measures for damage mitigation and reconstitution.”

In light of this perspective, security and network administrators and all who are responsible for ensuring corporate and national information assurance (IA) must realize that our work is far more significant than simply protecting our own local assets for the benefit of our own stakeholders; we are engaged in nothing less than a critical component of national security.

I think that this excellent article by some very intelligent and highly qualified experts will be useful in educating senior management about the importance of IA. I hope you enjoy reading it.


  What do you think?
Post a comment on this newsletter

TODAY'S MOST-READ STORIES:

1. Hogwarts IT director quits
2. Serious hole in BIND 9 DNS server
3. Free security tool ferrets out unpatched software
4. Cisco outlines fix for ARP storms on WLANs
5. 12 IT skills that employers can't say no to
6. Cisco outlines vision for the new data center
7. Security team claims successful iPhone hack
8. What will Windows 7 look like?
9. 11 corporate anthems to die for
10. Andreessen thanks EDS/Cisco for $138M

MOST E-MAILED STORY:
Hogwarts IT director quits


Contact the author:

M. E. Kabay, Ph.D., CISSP-ISSMP, is Associate Professor of Information Assurance and CTO of the School of Graduate Studies at Norwich University in Northfield, Vt. Mich can be reached by e-mail and his Web site.



ARCHIVE

Archive of the Security Strategies Newsletter.


BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

No comments:

Post a Comment