ABOUT US  |  CONTACT US  |  RSS  |  ARCHIVE  |  2024-04-28  |  UPDATED: 1402/11/15 - 18:13:1 FA | AR | PS | EN
Formation of the Federalist Assembly of Afghanistan             Israel launches missile attack on outskirts of Damascus, killing Syrian civilians             UK national scandal: 20,000 mental health patients raped, sexually assaulted in NHS care             Three US troops killed, dozens injured in drone attack in Syria             Trump says NATO will not come to rescue if US attacked             Ukraine beset by $40m fraud in arms procurement amid war with Russia            US approves sale of F-16 jets to Turkey after Ankara ratifies Swedens NATO membership             UNSC to meet to discuss ICJ ruling on Israeli genocide in Gaza             Taliban: Afghanistan Does Not Have Formal Border With Pakistan             Gazas major health facility collapses amid Israeli attacks: MSF             Americans to redeploy nuclear weapons in UK amid fears of WW3             Biden makes history: 1st sitting US president sued for complicity in genocide             Trump walks out of courtroom during closing arguments of Carrolls attorney            US: 3 dead in shooting at Texas apartment complex            US-UK aggression against Yemen risks expansion of war: Iran            


DATE PUBLISHED: 2018/3/2 - 13:21:31
VISIT: 1156
SHARE WITH YOUR FRIENDS

Infrastructure-based information system landscape
Infrastructure-based information system landscape

By: Sajad Abedi

By Sajad Abedi The discussion of cyber defense strategies is about a variety of issues, among which the most important issue is whether the significance of the potential damage caused by cyber-attacks can justify the use of a complex system for the implementation of this kind of defense. It is difficult to find an answer to this question because the available information is negligible and is often provided by sources whose impartiality is doubtful. In fact, the severity of the dangers of cybercrime (or, in other words, the constant hostile acts affecting information systems globally) cannot be simply determined.

But based on the evidence available, there have been significant cyber-attacks since 2007 (including deep-seated spyware interventions), all of which indicate cybercriminals that are more likely to be exploited Malicious actors; while information and communication systems in everyday activities have a very sensitive place to carry out physical and material operations, to store confidential and personal information or to exchange information among actors at distances.

In contrast to this wide range of malicious activities, the first issue that comes to be identified is the overall role that can have cyber defense.

In a defensive call, not only must have defensive and aggressive abilities, it should also prove the effectiveness of these abilities when needed, or, in other words, create a “reputable defense”.

Establishing “credible defense” in the cyberspace is a complicated problem, and the problems with identifying the root and the objectives of the attack will exacerbate it. The “Conficker” virus is a good example in this regard: the virus sped up in 2008 and 2009, infecting millions of computers, but its author was never identified.

Sometimes actors demonstrate “reputable defense” to showcase their cyber defense capabilities. But the current structure of the Internet and information systems prevents any kind of defense capability being displayed in real dimensions. An attack against a specific information system, for example, a power system for displaying power, allows you to convey persuasive reasons that prove the impact of the aggressive and defensive capabilities of the aforementioned actor, but on the other hand it can also have important adverse effects that they should take for responsibility. In addition, displaying power will not in a packet network, of course, have the same effect on a network.

In addition, the claim to have the ability to attack without passing the document and certificate damages the credibility of the deterrent system, but instead of showing the exact documents and the component, in addition to the ability, the knowledge that has been used in it for rival actors, it is possible to prepare for their support and increase the likelihood that rival actors will perform similar attacks.

For example, the analysis of the component part of the mystery behind the Stuxnet worm unveils its techniques and increases the likelihood that other potential authors will make the same development. But they do not provide definitive evidence of the role of having a specific actor. In this case, even the claims made in this regard cannot be stopped. (Gabi Ashkenazi, the Jewish general, when he retired, claimed he was the father of the Internet worm of Stuxnet.)

Stuxnet, of course, also poses other questions, including: why the same high-level techniques have not been used to hide the remains of the work? Or why the solution was not taken up to the “Stuxnet” worm upon completion of the attack? It will destroy itself to prevent the spread of knowledge used in it. But with the removal of footprints, the author reduces the ability to attribute their aggressive ability. Perhaps the Stuxnet worm has a two-way approach: showing its power at the expense of the diffusion of techniques (which may indicate that the author has more abilities), and provide enough evidence and evidence to prove your defensive ability.

Another issue in “prestigious defense” is the dependability of statements and claims: we must try to make it in the area of clarity and speed of data flow that we do not make false claims to be rejected by others and discredited, Because not only defense is not done, but the role of creator will certainly be questioned, and the loss of reputation in cyberspace will reduce the potential for defense.

For example, the US firm HBG (Federal Security Software Development Company) in 2010 claimed that it developed equipment that could detect hackers by analyzing data transmitted through social networks. Earlier this year, the company claimed that it had penetrated the Anonymous Group, had gained access to some of its members, and announced its readiness to sell the identity of the members to the FBI. In front of the Anonymous group, it also attacked the company’s site and published its tens of thousands of confidential emails over the Internet, disclosing the company’s intentions against WikiLeaks. Additionally, he announced that the people who had been nominated by HBG as members of the Anonymous group were not really members of the group, and that the methods used by HBGI to be not sure technically feasible. Following this revelation, the “HB” customers have gradually diverted from the company and the US government has begun research on the deal set between its defense services and the company.

A similar situation was made between NATO and the Anonymous group. In the spring of 2011, NATO released a report addressing the challenges of recent developments in cybercrime activism, in particular the operations of both WikiLeaks and Anonymous, claiming that the activities of the group (Anonymous It will not be late and soon its members will be identified and prosecuted. In response to NATO’s action, the Anonymous group stepped up its attacks on official sites, in particular the FBI, and announced in late July 2011 that it had attacked NATO sites and had several gigabytes of document he has stolen several documents on the Internet to prove his claims.

It should be noted that this action (prosecution of non-state actors), although not in the defense field, can undoubtedly proceed in the context of a long-running dispute between governments and an illegal group towards progression. In fact, this type of counteraction (and its methods used) is a reminder of the struggle against transnational or national criminal organizations.

The lack of a documented example of confrontation between governments in cyberspace does not mean that there is no such conflict. Rather, it shows that hostilities between the governments are more or less hidden for specific reasons (including the insistence on concealment of their abilities, attempts to avoid physical or economic coping, etc.). In addition, most of the activities in the cyberspace are made using spy services, and these groups have a prominent place in defensive actions. In the perspective of developing and developing cyber defense, this should be considered. There are two main options for governments to organize the development of defensive and aggressive capabilities:

– What France has chosen and confirmed in the White Defense and National Security Council of France, that two defensive and offensive functions should be separated:

France has assigned the Department of Defense to the “National Security Agency for Information Systems” and the offensive section of the Ministry of Defense and the General Directorate of Security.

– In front of the United States, he has chosen a strategy for combining two defensive and aggressive functions in one set, and both have been transferred to a single organization (the NSA).

Finally, it is important to emphasize that, in order to make the attacking and counteracting functions more effective against attacks, it is essential to apply multi-sectorial industrial relations in the field of informatics and to establish international cooperation and to develop and defend defense acceptable cybercrime influences.

 

LINK: https://www.ansarpress.com/english/9478


TAGS:






*
*

*



SEE ALSO

Federalism in Afghanistan: Opportunities and Challenges


Hamas has self-reliantly opposed the three giant intelligence agencies of the world!


Gaza Field Executions New Page in Israel Crimes Book


Lest we forget: Christmas, Gaza genocide and the Israeli occupation


Whats behind Netanyahu Declaring War on Palestinian Authority?


The Zionist right to defend itself is a license to oppress, kill Palestinians


With Netanyahu Struggling in Gaza Quagmire, Gaps Deepen inside His Cabinet


How the Zionist entity sought to make colonial myth of terra nullius a reality


Factbox: Israeli genocidal war on Gaza What has happened so far?


Taliban De-Persianizing Afghanistan Culture: Roots and Ramifications





VIEWED
MOST DISCUSSED




POLL

Modi, Merkel Discuss Afghanistan, Radicalisation And Terrorism

SEE RESULT


LAST NEWS

Federalism in Afghanistan: Opportunities and Challenges

Formation of the Federalist Assembly of Afghanistan

Israel launches missile attack on outskirts of Damascus, killing Syrian civilians

UK national scandal: 20,000 mental health patients raped, sexually assaulted in NHS care

Three US troops killed, dozens injured in drone attack in Syria

Trump says NATO will not come to rescue if US attacked

Ukraine beset by $40m fraud in arms procurement amid war with Russia

US approves sale of F-16 jets to Turkey after Ankara ratifies Swedens NATO membership

UNSC to meet to discuss ICJ ruling on Israeli genocide in Gaza

Taliban: Afghanistan Does Not Have Formal Border With Pakistan

Gazas major health facility collapses amid Israeli attacks: MSF

Americans to redeploy nuclear weapons in UK amid fears of WW3

Biden makes history: 1st sitting US president sued for complicity in genocide

Trump walks out of courtroom during closing arguments of Carrolls attorney

US: 3 dead in shooting at Texas apartment complex

US-UK aggression against Yemen risks expansion of war: Iran

Yemen directly hits US warship with ballistic missile

Hamas has self-reliantly opposed the three giant intelligence agencies of the world!

President Raeisi calls for UN reform, says body unable to end Gaza genocide

Pedram: The Abduction of Hazara and Tajik Women Recalls the Crimes of Abdur Rahman

Special envoys from G7 countries discuss Afghanistan in London meeting

Turkish lawmakers open debate over Swedens NATO membership

UN agency says over half a million Palestinians face catastrophic hunger in Gaza

Palestinian Islamic Jihad: Al-Maghazi operation proved defeat of Israeli regime in Gaza war

European support for Israel damaging energy security on the continent, report says

Pakistan Army Kills Seven Terrorists Near Afghan Border

Israel kills at least 190 people in Khan Younis in 24 hours

UNAMA report: 49 Hazara community members killed in Afghanistan in three months

Indias Modi inaugurates Hindu temple on site of razed mosque ahead of elections

US 2024 election: DeSantis drops out of Republican presidential race, backs Trump

Survivors of Russian charter flight crash transferred to Kabul

Irans anti-terror strikes clear message to certain recipients: Foreign Ministry

Ethnic mass killings in one Sudan city last year left up to 15,000 dead: UN report

Iran says reserves right to avenge Israels assassination of IRGC advisors

Rocket barrage targets Ain al-Asad base housing US forces in western Iraq

Lebanese media: Israeli drone kills 2 Hamas members in southern Lebanon

Five IRGC advisors assassinated in Israeli aggression on Syria

Pakistan recalls ambassador from Tehran

Iraqi PM stresses to NATO chief ending of foreign troops

UN chief reiterates call for immediate ceasefire in Gaza


MEDICAL NEWS


ANSAR PRESS  |  ABOUT US  |  CONTACT US  |  MOBILE VERSION  |  LINKS  |  DESIGN: Negah Network Co.
All right reserved. Use this website by mentioning the source (link) is allowed. Ԑ یی