Currently set to No Index

The Recent Cyber War: Who Won, Who Lost, and What Lessons Did We Learn?

The impact of inexpensive IT networking systems has made cyberwarfare capabilities relatively cheap initiatives compared to pursuing nuclear weapons. For instance, North Korean hackers are chosen from universities and begin training at the age of 17. Pay is remarkably good, elevating the hackers and their families to high social status. The question remains: who wins, who loses, and what can we learn from cyberwarfare?

North Korean Cyberwarfare, Unit 121

North Korean defectors report that the Democratic People’s Republic of Korea employs over 1,800 hackers in Unit 121. In addition, other smaller units work under the General Bureau of Reconnaissance that houses hackers all over the world. The difference is that Unit 121 is assigned the responsibility of disabling communications and command control in South Korea while smaller units, such as Lab 110, specifically target the telecommunications infrastructure in the event of a war.

Incident response plans are essential components of preparing for cyber attacks. In fact, they are consistent themes in IT security recommendations. Responsible organizations segment networks, implement access controls limits, and audit infrastructures for inappropriate connections and unfiltered access.

The most successful hackers indicate that walking into corporations and walking out with confidential information is simple. Techniques for securing sensitive data both in person and via the Internet include:

  1. Acting like you belong by carrying around a tablet PC with you
  1. Appearing as a journalist requiring data or posing as a computer security specialist
  1. Writing, testing, and debuging open-source software
  1. Running, living, and breathing Unix, which is the operating system of the Internet
  1. Developing competency in myriad programming languages
  1. Building proficiency in writing HyperText Mark-Up Language (HTML)
  1. Thinking creatively and believing in freedom and mutual responsibility
  1. Learning to solve problems correctly on the first attempt
  1. Recognizing and fighting against censorship and authority
  1. Publishing useful information for the hacker culture
RELATED:   CIO Perspective: Breach Happens

The growth of a genuine hacker is more verbose than intended. Hacks can range from practical jokes to an illustriously innovative computer program. Regardless of the type of hack, it must appear esthetically perfect. For example, hackers can create an entire HTML page embedded in a redirect page of the data URL to make it look exactly like the page it was before.

Multinational Government-backed Hackers

Garnering entrance to a system through stolen credentials and working deeper into networks to spread malware is similar to criminal breaches. The tools and skills used by attackers are conveniently available to just about anyone with determination, drive, energy, time, and access to the Internet. An instant supply of freelance cybercriminals and hackers is available to help any enterprise break into networks for the right price.

Hackers are the new Mafia of organized crime. Gangs in nations like Russia and China are particularly dangerous and resourceful, especially since governments in those countries are sponsoring the secret efforts of hackers and protecting them from international law enforcement.

Iran and India reportedly have armies of state-sponsored hackers infiltrating our critical infrastructure. The hackers are preparing for attacks that could paralyze the nation and create a profound and a new sense of vulnerability. In this way, cyberattacks are real threats to our security and our economy.

RELATED:   Choosing a Web Hosting Company

Predicting Cyber Wars of the Future

A meta-war between government and industry highlights the race to convince the most intellectual hackers to join one side of the war or the other. Cybersecurity is the fastest-growing and fastest-changing area of threat and opportunity. For that reason, predicting cyber wars of the future requires assembling an army of cyber warriors. Building the environment that allows hackers to do legally what would normally land them in jail means targeting those who might not pass government security clearance. For instance:

  • The Federal Bureau of Investigation has a strict three-year no-use drug policy, disqualifying a large number of perfectly skilled and trustworthy young hackers entering the workforce who have used drugs in the past.
  • Marketing efforts and compensation are more attractive in the private sector. Some hackers genuinely want a job so they can lawfully do what they do best.
  • Understanding someone who thinks outside of the box means not putting them in a box. The government tends to do just that with the hackers they recruit.
  • Private industry does not require hackers to wear a suit and tie, and tattoos are welcome.

World-wide Damage Potential

Successful hacks, even if not strategically relevant, set precedents that could encourage other countries like Russia and China to pursue American interests. If something of this proportion were to topple our government, it could produce disastrous results.

RELATED:   Web Hosting Pros to Meet at HostingCon 2011

Winners, Losers, and Lessons Learned

Winning and losing is often synonymous during cyber warfare. However, for every enterprise-level problem, a teachable moment exists, such as:

  • Recognizing that terrorists win when an activity is responded to, regardless of the level of response
  • Perceiving the immediate effects on corporate and popular cultures
  • Setting precedents for cybercrime with lack of responses
  • Risking escalated situations by responding to threats of and actual attacks

Modeling corporate culture, emphasizing ownership, and staying ahead of the curve all result in clearly evolved guidance and a culture where employees feel invested in their work and take ownership of tasks assigned to them. While hacks are inevitable, a state of preparedness asserted by a healthy corporate culture that puts security first is the only credible method that an attack can be accurately contained and strictly managed. 

Long-term Answers

The only long-term answer to a cyberwarfare threat is to make it increasingly hard to find vulnerabilities in IT systems and decrease the risks associated with successful attacks. That means that academic institutions, corporations, and software and hardware companies have to step up to actually make their networks less vulnerable to this type of attack by implementing better data security protocols. Another option is to let the government exert supplementary controls over the safety of the Internet. Nevertheless, all businesses need to pay close attention to cyberwarfare and begin to take data security seriously.

Top Image ©GL Stock Images

whg_banner.new.10k

How-to Start a Blog – Review of the Best 10 Blogging Platforms
How-to Start a Blog – Review of the Best 10 Blogging Platforms

If you want to start a blog as fast as possible, then you need to consider choosing a blogging platform. Thankfully, there are some excellent free and paid blogging platforms...

How Referral Marketing Can Benefit Web Hosts
How Referral Marketing Can Benefit Web Hosts

Even if the niche of web hosts are fully loaded with a lot of companies they are still one of the easiest to promote because you could write your own...

Broken Links: How to Find, Fix, and Benefit from Broken Links
Broken Links: How to Find, Fix, and Benefit from Broken Links

Links are what holds the web together. Essentially, the web is named as such because of the ability for pages and sites to link to other sources and relevant information....

Brand Value & the Most Powerful Brands (with Infographic)
Brand Value & the Most Powerful Brands (with Infographic)

Brand value – everyone wants it, however, only few are able to achieve it. The subject of “brand value” holds a significant position amongst marketers, executives, and entrepreneurs. Let’s discuss...

Reasons why your business should shift to Cloud hosting
Reasons why your business should shift to Cloud hosting

Cloud hosting has been on the rise since its inception. The improvement to your website performance and business efficiency that comes with Cloud hosting is almost tangible.

Why We Love the IT Support Career?
Why We Love the IT Support Career?

In almost all of my posts I was talking about the stressful side of the IT – the long hours, end user issues, migrations, midnight calls and the like. But...

IT Manager: Ways To Show Your Appreciation To Your Team
IT Manager: Ways To Show Your Appreciation To Your Team

Surely your team struggled hard and made things happen. You cannot say “this is what you get paid for” and just leave – you cannot keep your IT staff that...

Feeling Insecure In Your Current Job Position?
Feeling Insecure In Your Current Job Position?

Job security is one of our primary concerns. We everyday we live with the question of whether or not we will be working the next day. Loyalty is not the...

Leave a Reply

Your email address will not be published. Required fields are marked *