6
Most read
10
Most read
13
Most read
1
1. The Spectrum of Cyberwarfare
2. Offensive Cyber Operations
3. The ART of Defense
4. A comparative studies of nation states capabilities
PLAN
2
Key definitions :
Cyberwarfare :
A set of strategies used by a nation state actor or organization aimed at attacking countries
information systems infrastructure with the intention of disrupting , damaging or destroying.
Cyberwar :
The act of waging war on a nation state or organization to achieve a strategic political , economic or
ideological objective.
Cybersecurity strategy :
A high-level plan that defines how an organization or nation state actor intends to improve the
resilience and security of its cyberspace.
The Spectrum of Cyberwarfare
3
A “jus ad bellum” for Cyberwarfare :
Military Intelligence gathering
Collection of confidential information on current state of military capabilities and operations of a given nation-
state in support of current of futur operations. Example : Interception of digital communication to uncover
military plans
Geopolitical influence
Accrued tendency of nation-state to increase their existing capacity of influence & control on other nations from
the geophysical domain into the cyberspace through information warfare.
Support of Military Operations
Cyberwarfare is an enabler in support of tangible warfare operations such as disruption of a military
center of operations via a computer virus.
Strategic economic warfare
Attacks against a nation state using cyber technology with the aim of weakening its economy
through acquisition of trade secrets , sabotage of industrial facilities.
Cyber counterintelligence
Activities designed to prevent or thwart spying, intelligence gathering, and sabotage by an enemy or
other foreign entity.
The Spectrum of Cyberwarfare
4
The Spectrum of Cyberwarfare
Targets of Interest Example Attribution
Military Infrastructure
Espionage
NSA , FSB , GCHQ , MSS , DGRE
Electoral System &
Process
United States Election (2016) Russia’s FSB
Electrical powergrid Ukraine powergrid (2015) Russia’s FSB
Nuclear powerplant Iranian nuclear plant
Stuxnet virus (2010)
NSA & Israel Unit 8200
Communication systems BGP Hijacking Any major global telecom provider
Supply chain SolarWinds cyberattack (2020) Russia’s Cozy Bear
Any national infrastructure
considered critical
Colonial pipeline Any nation state actor with accrued geopolitical
motivation
5
The Spectrum of Cyberwarfare
6
A library of known adversary
Tactics – the adversary’s technical goals
Techniques – how those goals are achieved
Procedures – specific implementations of techniques
The framework contains 3 Matrices : Enterprise , Mobile and Industrial Control System
https://attack.mitre.org/
Offensive Cyber Operations
Into the premise of offensive cyberwarfare : from spies to APTs
APT ( Advanced Persistent Threat ) : Sophisticated cyber intrusion technique that exploits a
given vulnerability in a system inorder to gain extended persistent foothold with the aim of
achieving a specific malicious objective.
Lockheed Martin Cyberkill chain :
7
From Blitzkrieg to Bitskrieg :
- An intense german military stategy intended to bring about a swift victory in WW II
- Think about a series of swift attacks intended to shutdown a nation’s cyberspace
- Example : Shutdown of Ukraine Electrical Power Grid in 2015 by Sandworm
- Objective : Render your target’s system unoperational through disruptive intrusion in the shortest
possible time frame.
- Possibly : Erase disk , encrypt files , corrupt system kernel , change SCADA programming logic
Offensive Cyber Operations
8
DDOS Distributed Denial of Service:
Directing malicious traffic to a target by using a range of infected devices controlled by C² Servers.
Aim : Disrupt the availability of an online system
Examples :
▪ DNS Amplification Attack
▪ MIRAI Botnet Attack
Offensive Cyber Operations
9
Hunting for vulnerabilities & bugs :
A zero day (or 0-day) vulnerability is a security risk in a piece of software that is not publicly known
about and the vendor is not aware of. A zero- ay exploit is the method an attacker uses to access the
vulnerable system.
❑ Active purchase of 0-day exploitsby nation-state to compromise systems ... USA , EU
❑ Advanced vulnerability research program (R&D) ... China
❑ Development of exploits for known vulnerabilities ... Russia
Strategic Objective :
✓ Obtain initial access to a foreign nation state’s system
✓ Maintain a tactical advantage on other nation state
Example : Kaseya Attack , MSRPC Printer Spooler Relay , Zerologon , Stuxnet
Offensive Cyber Operations
10
Social Engineering & Phishing :
Social engineering is the psychological manipulation of people into performing actions or divulging
confidential information.
Cialdini's 6 Principles of Influence are : Reciprocity , Commitment/consistency, Social proof
,Authority, Liking, Scarcity.
Phishing is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or
otherwise deceptive) message designed to trick a person into revealing sensitive information to the
attacker
Objective : Leakage of confidential information
Offensive Cyber Operations
11
“If you know the enemy and know yourself, you need not fear the result of a
hundred battles. If you know yourself but not the enemy, for every victory
gained you will also suffer a defeat. If you know neither the enemy nor
yourself, you will succumb in every battle.”
“Sun Tzu
The ART of Defense
STEP ROAD MAP TO PLANNING A NATION-WIDE DEFENSE STATREGY
1 Assess your national cybersecurity landscape
2 Assess the cyber-risk landscape
3 Produce your national cyber strategy
4 Develop an action plan
5 Monitor and evaluate defined metrics of your strategy
6 Continuous improvement & update
12
The ART of Defense
BLUE PRINT FOR BUILDING A NATIONAL CYBERSECURITY DEFENSE STRATEGY
Governance Risk Management Legislation & Regulation
❑ Ensure the highest level of support
❑ Establish a competent cybersecurity
authority
❑ Ensure intra-government cooperation
❑ Ensure inter-sectoral cooperation
❑ Allocate dedicated budget and resources
❑ Define a risk-management approach
❑ Identify a common methodology for
managing cybersecurity risk
❑ Develop sectoral cybersecurity risk profiles
❑ Establishing cybersecurity policies
❑ Establish cybercrime legislation
❑ Recognise and safeguard individual rights and
liberties
❑ Create compliance mechanisms
❑ Promote capacity-building for law enforcement
Preparedness & Resilience Capability & Capacity Building Critical Infrastructure services & essential
services
❑ Establish cyber-incident response
capabilities
❑ Establish contingency plans for
cybersecurity crisis management
❑ Promote information-sharing
❑ Conduct cybersecurity exercises
❑ Develop cybersecurity curricula
❑ Stimulate skills development and workforce
training
❑ Implement a coordinated cybersecurity
awareness-raising programme
❑ Foster cybersecurity innovation and R&D
❑ Establish a risk-management approach to
protecting critical infrastructures
❑ and services
❑ Adopt a governance model with clear
responsibilities
❑ Define minimum cybersecurity baselines
❑ Establish public-private partnerships
13
Defending your critical infrastructure
The ART of Defense
Security best practices and trends
 Threat Intelligence & Hunting  Quantum & Post Quantum Cryptography
 Vulnerability Management  Threat Emulation
 Compliance Audit  Defense in depth
 EDR ( End-point detection & response)  Zero-Trust Architecture
 Security Awareness  Secure Enclaves
 SIEM ( Security Information &Event Management) ❑ MFA (Multi factor Authentication)
 SOAR ( Security Orchestration , Automation & Response ) ❑ Risk Management
 DLP ( Data loss prevention ) ❑ Next Generation Firewall
14
MITRE DEFEND Framework - https://d3fend.mitre.org/
The ART of Defense
15
A comparative studies of nation states capabilities
16
M E R C I !
T H A N K Y O U !
QUESTIONS ?
17

More Related Content

PPT
Network security and protocols
PPTX
Intrusion Prevention System
PPTX
Vulnerability Assesment
PPTX
Cyber security
PPTX
Cyber crime and security
PDF
Cyber Security Governance
PPTX
Ppt on cyber security
PPT
Software security
Network security and protocols
Intrusion Prevention System
Vulnerability Assesment
Cyber security
Cyber crime and security
Cyber Security Governance
Ppt on cyber security
Software security

What's hot (20)

PPT
LAN Security
PPTX
Vulnerability Assessment
PPTX
NIST CyberSecurity Framework: An Overview
PPTX
National Cyber Security Policy-2013
PPTX
Network security
PDF
HOW AI CAN HELP IN CYBERSECURITY
PPTX
Cyber attacks and IT security management in 2025
PPT
Hacking And Its Prevention
PPTX
Network security
PPTX
cyber security presentation.pptx
PPTX
Network security
PDF
Cyber Security 2017 Challenges
PPTX
Cybersecurity
PPTX
Network Security ppt
PDF
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
PDF
Cybersecurity and Internet Governance
PPTX
Threat Modeling In 2021
PDF
Application Security | Application Security Tutorial | Cyber Security Certifi...
PPTX
Information warfare.11
LAN Security
Vulnerability Assessment
NIST CyberSecurity Framework: An Overview
National Cyber Security Policy-2013
Network security
HOW AI CAN HELP IN CYBERSECURITY
Cyber attacks and IT security management in 2025
Hacking And Its Prevention
Network security
cyber security presentation.pptx
Network security
Cyber Security 2017 Challenges
Cybersecurity
Network Security ppt
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity and Internet Governance
Threat Modeling In 2021
Application Security | Application Security Tutorial | Cyber Security Certifi...
Information warfare.11
Ad

Similar to Case studies in cybersecurity strategies (20)

PDF
2015 Cyber Security Strategy
PDF
Understanding the 'physics' of cyber-operations - Pukhraj Singh
PDF
SecurityOperations
PDF
D20110714cyber
PDF
Department of Defense Strategy for Operating in Cyberspace
PDF
DoD Cyber Strategy
PPTX
cyber warfare
PDF
The Basics of Cyber Warfare_ Understanding the Fundamentals of Cyber Warfare ...
PPTX
Visually_Enhanced_Cyber_Warfare_Presentation.pptx
PDF
Cyberdefense strategy - Boston Global Forum - 2017
PDF
DNS Cybersecurity in 2012-2015
PPTX
Cyber Security Tools to be used for CS .pptx
PPTX
Cyber warfare ss
ODP
CWFI Presentation Version 1
PPTX
Cyber_Warfare_Indian_Army the digital battlefield-1.pptx
PDF
A US Cybersecurity Strategy for 2030
PDF
Science of Security: Cyber Ecosystem Attack Analysis Methodology
PPTX
Zero Trust.pptx
PDF
Changing Domains - The Cyber Info Realm 2023.pdf
2015 Cyber Security Strategy
Understanding the 'physics' of cyber-operations - Pukhraj Singh
SecurityOperations
D20110714cyber
Department of Defense Strategy for Operating in Cyberspace
DoD Cyber Strategy
cyber warfare
The Basics of Cyber Warfare_ Understanding the Fundamentals of Cyber Warfare ...
Visually_Enhanced_Cyber_Warfare_Presentation.pptx
Cyberdefense strategy - Boston Global Forum - 2017
DNS Cybersecurity in 2012-2015
Cyber Security Tools to be used for CS .pptx
Cyber warfare ss
CWFI Presentation Version 1
Cyber_Warfare_Indian_Army the digital battlefield-1.pptx
A US Cybersecurity Strategy for 2030
Science of Security: Cyber Ecosystem Attack Analysis Methodology
Zero Trust.pptx
Changing Domains - The Cyber Info Realm 2023.pdf
Ad

More from EyesOpen Association (20)

PDF
COLLECT AND ANALYZE RAM FOR DIGITAL INVESTIGATION
PDF
Ransomware : Challenges and best practices
PDF
Gestion des Incidents: prendre le contrôle de votre processus
PDF
Art du threat Modeling : Modéliser les menaces informatiques avec la méthode ...
PDF
Cyber and information security operations and assurance
PDF
Zero Trust : How to Get Started
PDF
CTFaaS pour la cybereducation
PDF
Phishing mails: Bonnes pratiques
PDF
Internal and External threats to a corporate network : Bypassing perimeter de...
PDF
Cybersecurity Competencies and the Future of Work
PDF
Approche de sécurisation des identités: Cas de Active Directory
PDF
Cyber threat intelligence avec Open CTI
PDF
Le rôle de la sensibilisation et de la formation à la cybersécurité
PDF
Cyber psychology: Understand your cyber security mental health culture
PDF
La sécurité des API: Quand les mauvais élèves entrent en piste.
PDF
Programme de cybersécurité : Implementer le framework NIST CSF en entreprise
PDF
Cyberguerre et Cyberdéfense: les nouveaux enjeux pour l’Afrique
PDF
Report: Digital Transformation and Application Security Posture in West and C...
PDF
Effective Information Security Risk and Controls Management
PDF
Cybersecurity in Mergers and Acquisitions (M&A)
COLLECT AND ANALYZE RAM FOR DIGITAL INVESTIGATION
Ransomware : Challenges and best practices
Gestion des Incidents: prendre le contrôle de votre processus
Art du threat Modeling : Modéliser les menaces informatiques avec la méthode ...
Cyber and information security operations and assurance
Zero Trust : How to Get Started
CTFaaS pour la cybereducation
Phishing mails: Bonnes pratiques
Internal and External threats to a corporate network : Bypassing perimeter de...
Cybersecurity Competencies and the Future of Work
Approche de sécurisation des identités: Cas de Active Directory
Cyber threat intelligence avec Open CTI
Le rôle de la sensibilisation et de la formation à la cybersécurité
Cyber psychology: Understand your cyber security mental health culture
La sécurité des API: Quand les mauvais élèves entrent en piste.
Programme de cybersécurité : Implementer le framework NIST CSF en entreprise
Cyberguerre et Cyberdéfense: les nouveaux enjeux pour l’Afrique
Report: Digital Transformation and Application Security Posture in West and C...
Effective Information Security Risk and Controls Management
Cybersecurity in Mergers and Acquisitions (M&A)

Recently uploaded (20)

PPTX
Shizophrnia ppt for clinical psychology students of AS
DOC
EVC毕业证学历认证,北密歇根大学毕业证留学硕士毕业证
DOCX
CLASS XII bbbbbnjhcvfyfhfyfyhPROJECT.docx
PDF
Public speaking for kids in India - LearnifyU
PDF
5_tips_to_become_a_Presentation_Jedi_@itseugenec.pdf
PDF
Module 7 guard mounting of security pers
PDF
MODULE 3 BASIC SECURITY DUTIES AND ROLES.pdf
PPTX
CAPE CARIBBEAN STUDIES- Integration-1.pptx
DOCX
Action plan to easily understanding okey
PPTX
FINAL TEST 3C_OCTAVIA RAMADHANI SANTOSO-1.pptx
PDF
PM Narendra Modi's speech from Red Fort on 79th Independence Day.pdf
PPTX
Kompem Part Untuk MK Komunikasi Pembangunan 5.pptx
PPTX
Copy- of-Lesson-6-Digestive-System.pptx
PPTX
CASEWORK Power Point Presentation - pointers
PDF
Presentation on cloud computing and ppt..
PPTX
Phylogeny and disease transmission of Dipteran Fly (ppt).pptx
PPTX
NORMAN_RESEARCH_PRESENTATION.in education
PPTX
power point presentation ofDracena species.pptx
PDF
Yusen Logistics Group Sustainability Report 2024.pdf
PDF
_Nature and dynamics of communities and community development .pdf
Shizophrnia ppt for clinical psychology students of AS
EVC毕业证学历认证,北密歇根大学毕业证留学硕士毕业证
CLASS XII bbbbbnjhcvfyfhfyfyhPROJECT.docx
Public speaking for kids in India - LearnifyU
5_tips_to_become_a_Presentation_Jedi_@itseugenec.pdf
Module 7 guard mounting of security pers
MODULE 3 BASIC SECURITY DUTIES AND ROLES.pdf
CAPE CARIBBEAN STUDIES- Integration-1.pptx
Action plan to easily understanding okey
FINAL TEST 3C_OCTAVIA RAMADHANI SANTOSO-1.pptx
PM Narendra Modi's speech from Red Fort on 79th Independence Day.pdf
Kompem Part Untuk MK Komunikasi Pembangunan 5.pptx
Copy- of-Lesson-6-Digestive-System.pptx
CASEWORK Power Point Presentation - pointers
Presentation on cloud computing and ppt..
Phylogeny and disease transmission of Dipteran Fly (ppt).pptx
NORMAN_RESEARCH_PRESENTATION.in education
power point presentation ofDracena species.pptx
Yusen Logistics Group Sustainability Report 2024.pdf
_Nature and dynamics of communities and community development .pdf

Case studies in cybersecurity strategies

  • 1. 1
  • 2. 1. The Spectrum of Cyberwarfare 2. Offensive Cyber Operations 3. The ART of Defense 4. A comparative studies of nation states capabilities PLAN 2
  • 3. Key definitions : Cyberwarfare : A set of strategies used by a nation state actor or organization aimed at attacking countries information systems infrastructure with the intention of disrupting , damaging or destroying. Cyberwar : The act of waging war on a nation state or organization to achieve a strategic political , economic or ideological objective. Cybersecurity strategy : A high-level plan that defines how an organization or nation state actor intends to improve the resilience and security of its cyberspace. The Spectrum of Cyberwarfare 3
  • 4. A “jus ad bellum” for Cyberwarfare : Military Intelligence gathering Collection of confidential information on current state of military capabilities and operations of a given nation- state in support of current of futur operations. Example : Interception of digital communication to uncover military plans Geopolitical influence Accrued tendency of nation-state to increase their existing capacity of influence & control on other nations from the geophysical domain into the cyberspace through information warfare. Support of Military Operations Cyberwarfare is an enabler in support of tangible warfare operations such as disruption of a military center of operations via a computer virus. Strategic economic warfare Attacks against a nation state using cyber technology with the aim of weakening its economy through acquisition of trade secrets , sabotage of industrial facilities. Cyber counterintelligence Activities designed to prevent or thwart spying, intelligence gathering, and sabotage by an enemy or other foreign entity. The Spectrum of Cyberwarfare 4
  • 5. The Spectrum of Cyberwarfare Targets of Interest Example Attribution Military Infrastructure Espionage NSA , FSB , GCHQ , MSS , DGRE Electoral System & Process United States Election (2016) Russia’s FSB Electrical powergrid Ukraine powergrid (2015) Russia’s FSB Nuclear powerplant Iranian nuclear plant Stuxnet virus (2010) NSA & Israel Unit 8200 Communication systems BGP Hijacking Any major global telecom provider Supply chain SolarWinds cyberattack (2020) Russia’s Cozy Bear Any national infrastructure considered critical Colonial pipeline Any nation state actor with accrued geopolitical motivation 5
  • 6. The Spectrum of Cyberwarfare 6 A library of known adversary Tactics – the adversary’s technical goals Techniques – how those goals are achieved Procedures – specific implementations of techniques The framework contains 3 Matrices : Enterprise , Mobile and Industrial Control System https://attack.mitre.org/
  • 7. Offensive Cyber Operations Into the premise of offensive cyberwarfare : from spies to APTs APT ( Advanced Persistent Threat ) : Sophisticated cyber intrusion technique that exploits a given vulnerability in a system inorder to gain extended persistent foothold with the aim of achieving a specific malicious objective. Lockheed Martin Cyberkill chain : 7
  • 8. From Blitzkrieg to Bitskrieg : - An intense german military stategy intended to bring about a swift victory in WW II - Think about a series of swift attacks intended to shutdown a nation’s cyberspace - Example : Shutdown of Ukraine Electrical Power Grid in 2015 by Sandworm - Objective : Render your target’s system unoperational through disruptive intrusion in the shortest possible time frame. - Possibly : Erase disk , encrypt files , corrupt system kernel , change SCADA programming logic Offensive Cyber Operations 8
  • 9. DDOS Distributed Denial of Service: Directing malicious traffic to a target by using a range of infected devices controlled by C² Servers. Aim : Disrupt the availability of an online system Examples : ▪ DNS Amplification Attack ▪ MIRAI Botnet Attack Offensive Cyber Operations 9
  • 10. Hunting for vulnerabilities & bugs : A zero day (or 0-day) vulnerability is a security risk in a piece of software that is not publicly known about and the vendor is not aware of. A zero- ay exploit is the method an attacker uses to access the vulnerable system. ❑ Active purchase of 0-day exploitsby nation-state to compromise systems ... USA , EU ❑ Advanced vulnerability research program (R&D) ... China ❑ Development of exploits for known vulnerabilities ... Russia Strategic Objective : ✓ Obtain initial access to a foreign nation state’s system ✓ Maintain a tactical advantage on other nation state Example : Kaseya Attack , MSRPC Printer Spooler Relay , Zerologon , Stuxnet Offensive Cyber Operations 10
  • 11. Social Engineering & Phishing : Social engineering is the psychological manipulation of people into performing actions or divulging confidential information. Cialdini's 6 Principles of Influence are : Reciprocity , Commitment/consistency, Social proof ,Authority, Liking, Scarcity. Phishing is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a person into revealing sensitive information to the attacker Objective : Leakage of confidential information Offensive Cyber Operations 11
  • 12. “If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.” “Sun Tzu The ART of Defense STEP ROAD MAP TO PLANNING A NATION-WIDE DEFENSE STATREGY 1 Assess your national cybersecurity landscape 2 Assess the cyber-risk landscape 3 Produce your national cyber strategy 4 Develop an action plan 5 Monitor and evaluate defined metrics of your strategy 6 Continuous improvement & update 12
  • 13. The ART of Defense BLUE PRINT FOR BUILDING A NATIONAL CYBERSECURITY DEFENSE STRATEGY Governance Risk Management Legislation & Regulation ❑ Ensure the highest level of support ❑ Establish a competent cybersecurity authority ❑ Ensure intra-government cooperation ❑ Ensure inter-sectoral cooperation ❑ Allocate dedicated budget and resources ❑ Define a risk-management approach ❑ Identify a common methodology for managing cybersecurity risk ❑ Develop sectoral cybersecurity risk profiles ❑ Establishing cybersecurity policies ❑ Establish cybercrime legislation ❑ Recognise and safeguard individual rights and liberties ❑ Create compliance mechanisms ❑ Promote capacity-building for law enforcement Preparedness & Resilience Capability & Capacity Building Critical Infrastructure services & essential services ❑ Establish cyber-incident response capabilities ❑ Establish contingency plans for cybersecurity crisis management ❑ Promote information-sharing ❑ Conduct cybersecurity exercises ❑ Develop cybersecurity curricula ❑ Stimulate skills development and workforce training ❑ Implement a coordinated cybersecurity awareness-raising programme ❑ Foster cybersecurity innovation and R&D ❑ Establish a risk-management approach to protecting critical infrastructures ❑ and services ❑ Adopt a governance model with clear responsibilities ❑ Define minimum cybersecurity baselines ❑ Establish public-private partnerships 13
  • 14. Defending your critical infrastructure The ART of Defense Security best practices and trends  Threat Intelligence & Hunting  Quantum & Post Quantum Cryptography  Vulnerability Management  Threat Emulation  Compliance Audit  Defense in depth  EDR ( End-point detection & response)  Zero-Trust Architecture  Security Awareness  Secure Enclaves  SIEM ( Security Information &Event Management) ❑ MFA (Multi factor Authentication)  SOAR ( Security Orchestration , Automation & Response ) ❑ Risk Management  DLP ( Data loss prevention ) ❑ Next Generation Firewall 14
  • 15. MITRE DEFEND Framework - https://d3fend.mitre.org/ The ART of Defense 15
  • 16. A comparative studies of nation states capabilities 16
  • 17. M E R C I ! T H A N K Y O U ! QUESTIONS ? 17