- The Strategist - https://aspistrategist.ru -

Cyber wrap

Posted By on December 23, 2015 @ 11:11

11184349836_ea2bfb1da8_z [1]

China hosted the second World Internet Conference [2] (WIC) in Wuzhen, Zhejiang province this week with President Xi Jinping delivering a keynote address at the opening ceremony. He called for international respect of ‘cyber sovereignty [3]’, which is the right of individual countries to determine the information available within their borders. Simultaneously, Xi warned against ‘cyber hegemony [4]’, arguing that the governance of cyberspace shouldn’t lie in the hands of the powerful few, but rather all stakeholders. The conference also produced the Wuzhen Initiative [5], a series of five principles addressing development, diversity, security and governance in cyberspace. The speech has also been interpreted [6] by some news outlets as a sign that Xi is ‘doubling down’ on cyber control. For a rundown of the main themes, check out Adam Segal’s interesting synopsis [7]. Also, read Scott Malcomson’s piece [8] on how the conference represents another step towards the fragmentation of cyber governance and the so-called ‘Splinternet’.

The encryption debate continues. To date, discussion has been divided between authorities who argue encryption backdoors are essential [9] to the law enforcement effort and tech companies who maintain that encryption is important [10] to security and customer privacy. But this week, arguments may be tilting in favour of the security-minded. Recent reports [11] from investigators in Paris affirm that the recent terrorist attacks involved the use of encrypted communication apps. Investigators believe that the terrorists may have exploited the end-to-end encryption of Whatsapp and Telegram [12], to coordinate their efforts on 13 November. Blackberry called this week for a fair balance to be struck between privacy and security, criticising Apple [13] for not helping authorities access encrypted information that was the subject of a criminal enquiry. The company’s CEO and Chairman asserted [14] that Blackberry’s ‘privacy commitment does not extend to criminals’ and as such they ‘reject the notion that tech companies should refuse reasonable, lawful access requests’.

A new WIRED analysis [15] by Mike Gault has a refreshing take on the encryption discussion, arguing that there’s much more to information security than confidentiality and perimeter protection. Gault reminds readers that cybersecurity is constituted by three principles: the ‘confidentiality, availability and integrity’ of data, known as the ‘CIA Triad [16]’. He criticises the current disproportionate focus on confidentiality and argues that the compromise of a data’s integrity is in fact ‘the biggest threat’.

In less positive news, Turkey fell victim to a Distributed Denial of Service (DDoS) attack this week. More than 400,000 websites [17] were flooded with information, crippling systems and putting pages offline. Unsubstantiated rumours began to circulate that this was a Russian retaliation [17] to the downing of a Russian fighter jet [18] by Turkey last month. However, responsibility has recently been claimed [19] by global hacktivist group, Anonymous, who state the attack is part of their ongoing #OpISIS. The group accuses Turkey of aiding ISIS by buying its oil and hospitalising its fighters, and argues this recent attack is Turkey’s punishment [20] for its alleged support of the terrorist group. The assault involved a network of malicious computers simultaneously overwhelming websites with online traffic, targeting [21] official domain names registered by NIC.tr—the administration office in the Turkish capital, Ankara. The incident [22] affected universities, government institutions and the military, causing all incoming traffic, including emails, to be shut down by Turkey’s National Response Centre for Cyber Events.

And finally, as the year draws to a close, it’s time to consider the main cyber lessons from 2015 and a couple of big predictions for 2016. Main [23] takeaways [24] include [25] the vulnerability of the Internet of Things and healthcare systems, as well as issues of third party security and insider threats. Looking ahead, check out some cybersecurity predictions for 2016 here [26], here [27] and here [28]. This Forbes article [29] presents a variety of research on the future of cybersecurity, notably predicting that the industry will jump from its current worth of US$75 billion to US$170 billion by 2020. So, it looks like we’ll have plenty to talk about next year, happy holidays!



Article printed from The Strategist: https://aspistrategist.ru

URL to article: /cyber-wrap-102/

URLs in this post:

[1] Image: https://aspistrategist.ru/wp-content/uploads/2015/12/11184349836_ea2bfb1da8_z.jpg

[2] World Internet Conference: http://www.wicnews.cn/indexen.shtml

[3] cyber sovereignty: http://www.bbc.com/news/world-asia-china-35109453

[4] cyber hegemony: http://english.cntv.cn/2015/12/16/ARTI1450246031274184.shtml

[5] Wuzhen Initiative: http://www.wuzhenwic.org/2015-12/18/c_48241.htm

[6] interpreted: http://www.cnbc.com/2015/12/18/china-signals-a-doubling-down-on-cybercontrol.html

[7] interesting synopsis: http://blogs.cfr.org/cyber/2015/12/16/chinas-internet-conference-xi-jinpings-message-to-washington/

[8] piece: http://www.huffingtonpost.com/scott-malcomson/welcome-to-the-splinterne_b_8855212.html?ir=Australia

[9] backdoors are essential: https://www.washingtonpost.com/world/europe/paris-attack-planners-used-encrypted-apps-investigators-believe/2015/12/17/e798d288-a4de-11e5-8318-bd8caed8c588_story.html

[10] encryption is important: http://www.theguardian.com/technology/2015/nov/23/apple-google-microsoft-weakening-encryption-back-doors

[11] Recent reports: http://edition.cnn.com/2015/12/17/politics/paris-attacks-terrorists-encryption/

[12] Whatsapp and Telegram: http://www.ibtimes.co.uk/paris-terrorists-used-whatsapp-telegram-plot-attacks-according-investigators-1533880

[13] criticising Apple: http://fortune.com/2015/12/17/blackberry-encryption-apple/

[14] asserted: http://blogs.blackberry.com/2015/12/the-encryption-debate-a-way-forward/

[15] WIRED analysis: http://www.wired.com/2015/12/the-cia-secret-to-cybersecurity-that-no-one-seems-to-get/

[16] CIA Triad: http://www.techrepublic.com/blog/it-security/the-cia-triad/

[17] 400,000 websites: http://www.telegraph.co.uk/technology/internet-security/12057478/Could-cyberattack-on-Turkey-be-a-Russian-retaliation.html

[18] Russian fighter jet: http://www.bbc.com/news/world-middle-east-34907983

[19] claimed: https://www.hackread.com/anonymous-40-gbps-ddos-attack-on-turkish-servers/

[20] punishment: http://www.hackbusters.com/news/stories/493161-anonymous-fesses-up-to-ddos-attacks-on-turkish-servers

[21] targeting: http://www.dailydot.com/politics/turkey-ddos-attack-tk-universities/

[22] incident: https://hacked.com/massive-ddos-cloud-rains-turkey/

[23] Main: http://www.itproportal.com/2015/12/16/looking-back-at-the-top-4-cybersecurity-trends-of-2015/

[24] takeaways: http://www.crn.com/slide-shows/security/300079141/10-cybersecurity-lessons-learned-in-2015.htm/pgno/0/3

[25] include: http://www.hotforsecurity.com/blog/biggest-cyber-security-events-of-2015-lessons-learned-for-a-safer-2016-13130.html

[26] here: http://www.mcafee.com/au/resources/reports/rp-threats-predictions-2016.pdf

[27] here: http://m2mworldnews.com/2015/12/16/10362-nine-cyber-security-trends-for-2016/

[28] here: http://www.networkworld.com/article/3015442/security/a-few-cybersecurity-predictions-for-2016.html

[29] Forbes article: http://www.forbes.com/sites/stevemorgan/2015/12/20/cybersecurity%E2%80%8B-%E2%80%8Bmarket-reaches-75-billion-in-2015%E2%80%8B%E2%80%8B-%E2%80%8Bexpected-to-reach-170-billion-by-2020/

Copyright © 2024 The Strategist. All rights reserved.