100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
Lecture notes for 3 exam relevant lectures €9,49   In winkelwagen

College aantekeningen

Lecture notes for 3 exam relevant lectures

 23 keer bekeken  2 keer verkocht

These are the lecture notes from the slides and presentation of the lecturer of the 3 lectures that are relevant for the exam I did not summarize the articles I hope it helps everyone that was not able to attend the lectures

Voorbeeld 3 van de 23  pagina's

  • 18 december 2023
  • 23
  • 2023/2024
  • College aantekeningen
  • Jelena
  • 6, 7, 14
Alle documenten voor dit vak (3)
avatar-seller
studentCSM99
Espionage and War in Cyberspace
Meeting 7 - Cyber Conflict
Does the concept of cyber war help us understand what is going on in cyberspace?
If what we are seeing is not cyber war, then what is it?

What is war?
Carl von Clausewitz in On War
- War is continuation of politics by others means
- War is:
- Intrinsically violent
- Instrumental
- Fought by states

Small and Singer in Resort to Arms: International and Civil War
- War must be defined in terms of violence
→ Taking human life is the primary and dominant characteristic of war
→ War is sustained combat, involving organised armed forces, resulting in a
minimum of 1000 battle-related fatalities in a 12-month period

What do states compete over?
- The sources of national power, that could be material or non-material (Waltz, 1979)
- Sources of state power existed primarily in the physical control of the land, sea, air

Until cyberspace existed

What is cyberspace?
Cyberspace = Domain characterised by the use of electronics and the electromagnetic
spectrum to store, modify and exchange data via networked systems and associated
physical infrastructures (US DoD)

Cyberspace = A global domain within the information environment consisting of the
interdependent network of information systems infrastructures including the Internet,
telecommunications networks, computer systems and embedded processors and controllers
(National Institute of Standards and Technology)

Cyberspace = The interdependent network of information and communications technology
infrastructures that includes the internet
→ How we interface with this network of networks is creating an evolving behavioural space
that is initiating social, economic and political dynamics
→ While much of this behaviour is benign and positive, there is a growing negative, even
malignant, use. Thus considerations of cybersecurity are becoming more prominent

Threat actors and vectors multiply across the same interconnected space

,→ Diversity of actors: Nation-states both for conflict and for intelligence-gathering,
business-corporate spying, organised crime, terrorists, hacktivists, black-hat hackers,
patriotic hackers, researchers and experts, individuals
New seam in international politics:
- Traditionally:
- Land, air, sea, space
- Need to move armies across borders, defeat the enemy, achieve political
objectives
- Clear distinction between the state of peace and the state of war
- Now:
- Cyberwar
- Grayzone: The space between war and peace is not an empty oe but a
landscape churning with political, economic and security competitions that
require constant attention (Schadlow, 2014)

What is cyber war?
Cyber war = War conducted in and from computers and the networks connecting them,
waged by states or their proxies against other states (Encyclopedia Britannica)

Because cyberweapons are not overtly violent, their use is unlikely to fit the traditional
criterion of interstate war: rather, the new capability is expanding the range of possible harm
and outcomes between the concepts of war and peace (Kello, The Meaning of the Cyber
Revolution)

Challenges of the digital domain
Cyberspace is a domain of persistent threat where achieving security an everyday challenge

Cyberspace possess distinct characteristics that make it insecure
- Cyberspace is a human construction
→ Highly malleable
- Underlying cyber infrastructure is always changing
- It can be manipulated, adapted and abused
- Cyberspace spans the physical and digital words
- Hardware (computers, servers, cables) exist in the ‘real world’, bu taction
occur online
- No international agreement on territoriality
- Fairly low cost of entry
- Attribution is challenging and time consuming
- Cyberspace is interconnected (cannot easily be segmented)
- The ‘frontline’ is everywhere
- There is no ‘safe’ zone in cybersecurity
- Everywhere that you operate can be attacked
- Vector for attack may even be outside of your control
- Allies are also potential vulnerabilities if your adversary can
compromise their networks
- States can also be compromised by vulnerabilities in their
supply chains

, - No distinction between civilians and combatants
→ Critical infrastructure, private companies, and individuals can all be
targeted by foreign actors
Endemic vulnerability
- Modern operating systems and applications are extremely complex programs
→ Certain flaws in the program, called exploits, can be used by hackers as entry
points
- Zero Day attacks
→ Zero Day = Vulnerability in a piece of software that is unknown by the software
developers
- Delayed Patching and Updating
→ Even when an exploit is known patches need to be created and computers need
to be updated
→ Installing updates are often delayed allowing known exploits to be continually used

How do states use cyberspace to compete in the international
system?
CNE = Computer Network Exploitation
→ Enabling operations and intelligence collection capabilities conducted through the use of
computer networks to gather data from target or adversary information systems or networks

CNA = Computer Network Attack
→ Operations to disrupt, deny, degrade or destroy information resident in computers and
computer networks, or the computers and networks themselves

Offensive cyber capabilities
Objectives:
- Deny = To prevent the adversary from accessing and using critical information,
systems and services
→ To degrade, disrupt, destroy access to a target by a specific level for a specified
time
- Destroy = To damage a system/entity so badly that it cannot perform any function or
be restored to a useable condition without being entirely rebuilt
- Disrupt = To break/interrupt the flow of information. To completely but temporarily
deny access to, or operation of, a target for a period of time
- Degrade = To deny access to, or operation of, a target to a level represented as a
percentage of capacity
- Deceive = Mislead adversary decision makers by manipulating their perception of
reality
→ To control or change adversary’s information, information systems, and/or
networks in a desired manner

To make the differences between these objectives more clear, I found this article which
elaborates on these 5Ds. It also gives an clear illustration:

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

Verzekerd van kwaliteit door reviews

Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper studentCSM99. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €9,49. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 62555 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen
€9,49  2x  verkocht
  • (0)
  Kopen