1 of 58

�� Maj Gen PK Mallick, VSM (Retd)

OTA

09 Nov 2023

Cyber Warfare

2 of 58

https://www.strategicstudyindia.com/

3 of 58

https://indianstrategicknowledgeonline.com/

4 of 58

5 of 58

6 of 58

7 of 58

Kindle Edition on Amazon

8 of 58

9 of 58

Cyber Warfare

10 of 58

Predicting the Future Video Roberts Gates

11 of 58

Components of Cyber Warfare

  • Computer Network Attack (CNA), Computer Network Defence (CND) and Computer Network Exploitation (CNE).

  • Computer Network Exploitation (CNE). CNE uses actions and operations to obtain information that would otherwise be kept classified and is resident on or transiting through an adversary's computer systems or networks. Cyber exploitations are usually covert in nature. They do not seek to disturb the normal functioning of a computer system or network. The best cyber exploitation is one that a user never notices. It is non-destructive.

  • Fundamental difference between a cyber attack and cyber exploitation is the payload's nature to be executed. A cyberattack payload is destructive, whereas a cyber exploitation payload acquires information non-destructively.

  • Intent has to change.

12 of 58

Cyber War Game

13 of 58

14 of 58

 

 

15 of 58

Attack on Syrian Nuc Instln 05-06 September 2007

16 of 58

17 of 58

18 of 58

Defensive Cyber Operation

19 of 58

Ministry of Communication and Information Technology �Department of Electronics and Information Technology�Notification on National Cyber Security Policy-2013 (NCSP-2013)

Dated: 02 July, 2013

Strategies for National Cyber Security Policy-2013 (1/2)

  • Creating a secure cyber ecosystem.
  • Creating an assurance framework.
  • Encouraging Open Standards.
  • Strengthening the Regulatory framework.
  • Creating mechanisms for security threat early warning, vulnerability management and response to security threats.
  • Securing E-Governance services.
  • Protection and resilience of Critical Information Infrastructure.

20 of 58

Ministry of Communication and Information Technology �Department of Electronics and Information Technology�Notification on National Cyber Security Policy-2013 (NCSP-2013)

Dated: 02 July, 2013

Strategies for National Cyber Security Policy-2013 (2/2)

  • Protection and resilience of Critical Information Infrastructure.
  • Promotion of Research & Development in cyber security.
  • Reducing supply chain risks.
  • Human Resource Development.
  • Creating Cyber Security Awareness.
  • Developing effective Public Private Partnerships.
  • Information sharing and cooperation.
  • Prioritized approach for implementation.

21 of 58

22 of 58

NCIIPC

23 of 58

CERTIN

24 of 58

INDIA

25 of 58

26 of 58

27 of 58

Global Cybersecurity Index : 2020

28 of 58

Cyber Hygiene

Cyber hygiene is the process of observing correct routines to ensure the integrity of data within a network. 

  • The Weak Link is the people.
  • Install a Network Firewall 
  • Use a Quality Antivirus
  • Encrypt Your Devices
  • Back Up Regularly. Ransomware
  • Use Secure Passwords
  • Adopt Multi-Factor Authentication 
  • Update Device Software Regularly 
  • Educate Your People

29 of 58

30 of 58

Cyber Hygiene

Cyber hygiene is the process of observing correct routines to ensure the integrity of data within a network. 

  • The Weak Link is the people.
  • Install a Network Firewall 
  • Use a Quality Antivirus
  • Encrypt Your Devices
  • Back Up Regularly. Ransomware
  • Use Secure Passwords
  • Adopt Multi-Factor Authentication 
  • Update Device Software Regularly 
  • Educate Your People

31 of 58

32 of 58

33 of 58

34 of 58

35 of 58

36 of 58

37 of 58

�State of Digital India in 2023�

  • 692.0 million internet users, internet penetration is 48.7 percent. 51.3 percent of the population remained offline.
  • Home to 467.0 million social media users, equating to 32.8 percent of the total population.
  • A total of 1.10 billion cellular mobile connections active equivalent to 77.0 percent of the total population.
  • 67.5 percent of India’s total internet user base (regardless of age) used at least one social media.
  • Facebook has 314.6 million users.
  •  YouTube has 467.0 million users.
  • Instagram has 229.6 million users.
  • Facebook Messenger has 117.6 million users. 
  • LinkedIn has 99.00 million “members”.
  • Snapchat has 172.5 million users.
  • Twitter has 27.25 million users.

38 of 58

Use of Social Media

  • Connectivity
  • Education
  • Help
  • Information and Updates
  • Promotion
  • Noble Cause
  • Awareness
  • Help Government Agencies fight crime
  • Improves Business Reputation
  • Help in building communities

39 of 58

40 of 58

41 of 58

42 of 58

Disadvantages of Social Media

  • Cyber Bullying – Create a fake account.
  • Hacking – By professionals resulting in financial and personal loses.
  • Fraud and Scams – Steal People’s money and identities.
  • Security Issues – Privacy compromise.
  • Time Waster – 28% of the time spent online is on social media networks.

43 of 58

44 of 58

45 of 58

46 of 58

Human Resource Management

47 of 58

Perceptions of the Military by Potential Cyber Warriors

  • My Boss Didn’t Know the Difference Between an IP Address and a Phone Number.

-- Anonymous Cyber Soldier

  • Rank is nothing: talent is everything. - David Kilcullen
  • The Army will need this lieutenant 20 years from now when he could be a colonel, or 30 years from now when he could have four stars on his collar. But I doubt he will be in uniform long enough to make captain.
  • Low pay – “I can walk into any DoD security contractor out there with my DD214 and make 10 times what I did when I was discharged”

48 of 58

“I’ve got no time for new technology – I’ve got a battle to fight.”

49 of 58

Conclusion

50 of 58

Conclusion

  • War is won on land.
  • Competence in basic tactics, techniques and procedure should never be compromised.
  • Technology is not a panacea.
  • Be aware of emerging technology and its implications.
  • Many a times overhyped. Non contact warfare, Non kinetic warfare, New type of warfare, Grey zone warfare, hybrid warfare.
  • Will not replace conventional warfare. Will take place simultaneously.
  • Educate soldiers and their families.

51 of 58

52 of 58

Amos Yadlin , Executive Director of Tel Aviv University's Institute for National Security Studies (INSS) and former IDF's chief of Military Intelligence

As a fighter pilot, I have a great deal of respect for airpower but it cannot determine the battle on its own and neither can the cyber realm. It is an important realm, but not one that can replace the physical dimension or combat. With all due respect to the cyber realm at the end of the day, we need soldiers on the mountaintops to finalise matters….. As to the future of the cyber realm, it may be that ‘winter is coming,’ or a Pearl Harbor, but we aren’t there yet.

How it could be if the cyber realm is such a powerful dimension, that the Russians have already been fighting in Syria for three years and have not yet decided the campaign? How have the Americans been fighting in Afghanistan for 17 years?”

53 of 58

If you want to keep for civilization that portion of land called home, you still need to be willing to put your sons and daughters in the mud to defend it.

-- T. R. Fehrenbach

54 of 58

“IN OUR EFFORT TO CAPTURE THE LEADING EDGE OF THE INFO AGE, IT IS IMPORTANT TO REMEMBER THAT AT NIGHT, IN THE RAIN, ATTACKING UPHILL IN THE MUD, IT IS THE QUALITY OF THE LEADERSHIP, NOT THE SPEED OF THE PROCESSOR, THAT WILL CARRY THE BATTLE”.

55 of 58

WHO IS WINNING ?

56 of 58

57 of 58

Q & A

58 of 58

THANK YOU