Quantcast

Articles

Get all-in-one coverage of Internet security and online privacy issues brought up by the industry’s leading experts at security conferences and seminars.

The Modern History of Cyber Warfare 9: Cybersecurity Hurdles

The lecture wraps up with an overview of the principal policy hurdles for the West in terms of implementing proper cybersecurity now and in the future. Now I will go over, basically, the policy hurdles that the West faces (see right-hand image), specifically this country, the United States. This portion of...

The Modern History of Cyber Warfare 8: A History of Legislature Failure

This part encompasses a retrospective review of US laws and acts as well as pros and cons of current legislative proposals on the surveillance of cyberspace. So, let’s talk about US legislature in this area, or what I subtitled as “a history of failure” (see right-hand image). In the 1980s...

The Modern History of Cyber Warfare 7: Legislation and Policies

Coverage of the existing legislation addressing cybercrime, as well as cooperation of private sector and government in this realm, are reflected in this entry. So, how do we begin making policies and laws with all this uncertainty? It’s really a problem that I’m glad I don’t have to fix. However,...

The Modern History of Cyber Warfare 6: Possible Cyber War Scenario

What gets overviewed herein is the modeling of a cyber war if it were to break out, and the various nuances of attacker attribution in the present-day world. So here’s what the common perception of what a cyber war would look like. There will be, basically, targeted efforts and pervasive cultural efforts...

The Modern History of Cyber Warfare 5: The Internet of Things

The lecturer now outlines the hazards associated with billions of things being connected to the Internet and highlights nation state cyber warfare goals. As we’re approaching billions and billions of things connected to the Internet, imagine supply chain attacks for what we are calling the Internet of...

The Modern History of Cyber Warfare 4: 0day Black Market and State Sponsored Attacks

This entry covers the issue of 0day exploits being discovered and unethically used by some companies to gain profit, and touches upon state sponsored attacks. We are basically kind of in the middle of a cyber cold war, and the evidence is kind of staring right at us. So let’s talk about, basically, the...

The Modern History of Cyber Warfare 3: Ongoing Debate on APTs

This section touches upon the tangible consequences of advanced persistent threats being utilized and the debate concerning the acceptable extent of that. While we’re talking about groups of hackers, let’s just dive into the deep end of it: advanced persistent threats, and talk about the small history...

The Modern History of Cyber Warfare 2: Hacker Culture in the Western and Eastern World

The “Offensive Security” lecture at FSU continues with extensive analysis of advanced persistent threats of the last several years and an overview of hacker culture differences globally. So, while we were still in 2010, in June Stuxnet was discovered; at least Stuxnet v.1.01.1, and everyone in...

The Modern History of Cyber Warfare

This article reflects the lecture for CIS5930/CIS4930 “Offensive Security” at the Florida State University, covering some of the events that compose the history of what’s called “cyber warfare”. Today’s lecture is about that term: cyber warfare, the history of it, the public...

The Lifecycle of Cybercrime 5: Public-Private Partnerships as a Countermeasure

Now Erik Rasmussen takes some time to talk about the US Secret Service’s achievements and the role of public-private partnerships in fighting cybercrime. Nicholas Percoco: Now I’d like to have you spend a couple of minutes talking about some of the successes your organization has had. We spoke a lot...