{"id":24044,"date":"2015-12-23T11:11:56","date_gmt":"2015-12-23T00:11:56","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=24044"},"modified":"2015-12-23T11:22:47","modified_gmt":"2015-12-23T00:22:47","slug":"cyber-wrap-102","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-102\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"11184349836_ea2bfb1da8_z\"<\/a><\/p>\n

China hosted the second World Internet Conference<\/a> (WIC) in Wuzhen, Zhejiang province this week with President Xi Jinping delivering a keynote address at the opening ceremony. He called for international respect of \u2018cyber sovereignty<\/a>\u2019, which is the right of individual countries to determine the information available within their borders. Simultaneously, Xi warned against \u2018cyber hegemony<\/a>\u2019, arguing that the governance of cyberspace shouldn\u2019t lie in the hands of the powerful few, but rather all stakeholders. The conference also produced the Wuzhen Initiative<\/a>, a series of five principles addressing development, diversity, security and governance in cyberspace. The speech has also been interpreted<\/a> by some news outlets as a sign that Xi is \u2018doubling down\u2019 on cyber control. For a rundown of the main themes, check out Adam Segal\u2019s interesting synopsis<\/a>. Also, read Scott Malcomson\u2019s piece<\/a> on how the conference represents another step towards the fragmentation of cyber governance and the so-called \u2018Splinternet\u2019.<\/p>\n

The encryption debate continues. To date, discussion has been divided between authorities who argue encryption backdoors are essential<\/a> to the law enforcement effort and tech companies who maintain that encryption is important<\/a> to security and customer privacy. But this week, arguments may be tilting in favour of the security-minded. Recent reports<\/a> from investigators in Paris affirm that the recent terrorist attacks involved the use of encrypted communication apps. Investigators believe that the terrorists may have exploited the end-to-end encryption of Whatsapp and Telegram<\/a>, to coordinate their efforts on 13 November. Blackberry called this week for a fair balance to be struck between privacy and security, criticising Apple<\/a> for not helping authorities access encrypted information that was the subject of a criminal enquiry. The company\u2019s CEO and Chairman asserted<\/a> that Blackberry\u2019s \u2018privacy commitment does not extend to criminals\u2019 and as such they \u2018reject the notion that tech companies should refuse reasonable, lawful access requests\u2019.<\/p>\n

A new WIRED analysis<\/a> by Mike Gault has a refreshing take on the encryption discussion, arguing that there\u2019s much more to information security than confidentiality and perimeter protection. Gault reminds readers that cybersecurity is constituted by three principles: the \u2018confidentiality, availability and integrity\u2019 of data, known as the \u2018CIA Triad<\/a>\u2019. He criticises the current disproportionate focus on confidentiality and argues that the compromise of a data\u2019s integrity is in fact \u2018the biggest threat\u2019.<\/p>\n

In less positive news, Turkey fell victim to a Distributed Denial of Service (DDoS) attack this week. More than 400,000 websites<\/a> were flooded with information, crippling systems and putting pages offline. Unsubstantiated rumours began to circulate that this was a Russian retaliation<\/a> to the downing of a Russian fighter jet<\/a> by Turkey last month. However, responsibility has recently been claimed<\/a> by global hacktivist group, Anonymous, who state the attack is part of their ongoing #OpISIS. The group accuses Turkey of aiding ISIS by buying its oil and hospitalising its fighters, and argues this recent attack is Turkey\u2019s punishment<\/a> for its alleged support of the terrorist group. The assault involved a network of malicious computers simultaneously overwhelming websites with online traffic, targeting<\/a> official domain names registered by NIC.tr\u2014the administration office in the Turkish capital, Ankara. The incident<\/a> affected universities, government institutions and the military, causing all incoming traffic, including emails, to be shut down by Turkey\u2019s National Response Centre for Cyber Events.<\/p>\n

And finally, as the year draws to a close, it\u2019s time to consider the main cyber lessons from 2015 and a couple of big predictions for 2016. Main<\/a> takeaways<\/a> include<\/a> the vulnerability of the Internet of Things and healthcare systems, as well as issues of third party security and insider threats. Looking ahead, check out some cybersecurity predictions for 2016 here<\/a>, here<\/a> and here<\/a>. This Forbes<\/em> article<\/a> presents a variety of research on the future of cybersecurity, notably predicting that the industry will jump from its current worth of US$75 billion to US$170 billion by 2020. So, it looks like we\u2019ll have plenty to talk about next year, happy holidays!<\/p>\n","protected":false},"excerpt":{"rendered":"

China hosted the second World Internet Conference (WIC) in Wuzhen, Zhejiang province this week with President Xi Jinping delivering a keynote address at the opening ceremony. He called for international respect of \u2018cyber sovereignty\u2019, which …<\/p>\n","protected":false},"author":390,"featured_media":24045,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[52,393,391,1012,747],"class_list":["post-24044","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-china","tag-cia","tag-cyber","tag-daesh","tag-turkey"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-102\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"China hosted the second World Internet Conference (WIC) in Wuzhen, Zhejiang province this week with President Xi Jinping delivering a keynote address at the opening ceremony. He called for international respect of \u2018cyber sovereignty\u2019, which ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-102\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2015-12-23T00:11:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-12-23T00:22:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/12\/11184349836_ea2bfb1da8_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"427\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Zoe Hawkins\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Zoe Hawkins\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-102\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/12\/11184349836_ea2bfb1da8_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/12\/11184349836_ea2bfb1da8_z.jpg\",\"width\":640,\"height\":427},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-102\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-102\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-102\/#primaryimage\"},\"datePublished\":\"2015-12-23T00:11:56+00:00\",\"dateModified\":\"2015-12-23T00:22:47+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-102\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-102\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-102\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701\",\"name\":\"Zoe Hawkins\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g\",\"caption\":\"Zoe Hawkins\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/zoe-hawkins\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-102\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"China hosted the second World Internet Conference (WIC) in Wuzhen, Zhejiang province this week with President Xi Jinping delivering a keynote address at the opening ceremony. He called for international respect of \u2018cyber sovereignty\u2019, which ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-102\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2015-12-23T00:11:56+00:00","article_modified_time":"2015-12-23T00:22:47+00:00","og_image":[{"width":640,"height":427,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/12\/11184349836_ea2bfb1da8_z.jpg","type":"image\/jpeg"}],"author":"Zoe Hawkins","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Zoe Hawkins","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-102\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/12\/11184349836_ea2bfb1da8_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/12\/11184349836_ea2bfb1da8_z.jpg","width":640,"height":427},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-102\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-102\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-102\/#primaryimage"},"datePublished":"2015-12-23T00:11:56+00:00","dateModified":"2015-12-23T00:22:47+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-102\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-102\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-102\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701","name":"Zoe Hawkins","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g","caption":"Zoe Hawkins"},"url":"https:\/\/www.aspistrategist.ru\/author\/zoe-hawkins\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/24044"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/390"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=24044"}],"version-history":[{"count":4,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/24044\/revisions"}],"predecessor-version":[{"id":24049,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/24044\/revisions\/24049"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/24045"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=24044"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=24044"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=24044"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}