近期网络事件和对武装部队可能产生的影响#4

ID:25586

大小:0.32 MB

页数:6页

时间:2022-12-01

金币:15

上传者:战必胜
Recent Cyber Events and Possible
Implications for Armed Forces
#4 July 2020
About this paper
This paper is the collaborative view of NATO CCDCOE researchers highlighting the potential effects
on the military of current events and of developments in cyberspace during the previous month,
based on publicly available information. It does not set out to be exhaustive. While the authors have
made every effort to describe events from a perspective relevant to NATO and partner nations, there
may be national and regional differences which this paper does not address.
The authors of this paper are independent researchers at the NATO CCDCOE; they do not represent
NATO, nor does this paper reflect NATO’s position. The aim of the paper is not to replace information
about vulnerabilities and incidents provided by CSIRTs and providers of CIS products and services.
1. Targeted threats against the
military and national security
Leaked government data could put
personnel at risk
It was reported on Friday (May 29) that a
government database of more than 20 million
Taiwanese citizens was leaked on the dark
web. […] It is unusual for an entire nation’s
database to be leaked, [the cyber threat
intelligence company] Cyble reported.’
(Taiwan News, 30 May 2020)
The leak of the Taiwanese home registry
database is an unusually large breach. The
leaked data is said to include names,
addresses, genders, dates of birth and other
private information of citizens. Data breaches
of various sizes have become a more
common tactic of hostile actors. Well-known
cases include the 2012 breach of outsourced
Swedish government databases, including
information about police employees and the
addresses of people with protected identities;
a similar case in Denmark;
1
and the US Office
of Personnel Management breach, which
included sensitive information on government
employees.
2
Even less sensitive information may aid
foreign intelligence services in identifying and
targeting individuals in sensitive positions.
Leaks of individual records or pieces of
1
Newsweek: Pirate Bay co-founder found guilty of
hacking crimes in 'historic' case
information are usually not so damaging, but
a complete database could be a much more
useful source for an adversary’s intelligence
service as information can be combined and
compared in different ways. Detailed
knowledge about individuals gained from such
leaks could, for example, aid in making
credible phishing campaigns or preparing
convincing documents containing malware.
The more personal information an adversary
has, the more likely those types of attacks are
to be successful.
Management and protection of population and
property registers are usually not under the
direct control of national security or military
authorities, which calls for interagency
cooperation and careful risk analysis in
determining and implementing the appropriate
security measures and controlling what
information can be held in the registers.
2. Other cyber activities relevant to
the military
Australias response to disinformation
campaigns
‘The Australian government recently
announced plans to establish the country’s
first taskforce devoted to fighting
disinformation campaigns, under the
2
Wired: Inside the cyberattack that shocked the
US government
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭