text
stringlengths 4
429
|
---|
and academies to train specialists that would be able to operate at the |
diplomatic, management, or individual level. The training system would |
Baltic Security & Defence Review |
Volume 11, 2009 |
also include the creation of an Information Special Forces that are highly |
trained to for conducting information operations in a crisis. (Panarin, 2008) |
Along with the creation of the information warfare system Dr. Panarin |
believes that financing for information warfare needs to be increased by |
both the Russian government and by Russian businesses. The increased |
attention on information warfare is designed to increase Russia |
s image |
throughout the world and ensure that Russia is prepared for future conflict |
in the cyber and information arenas. (Panarin, 2008) |
Statements by Russian government officials have been very similar to Dr. |
Panarin |
s position which makes the future of cyber warfare in Russia |
offensively poised. Colonel Aleksandr Drobyshevskiy, head of the Russian |
Federation Ministry of Defence Directorate for Press Service and |
Information, stated that Georgia won the information war during the |
conflict in South Ossetia and there is a need for the development of |
information and telecommunications technologies within the Ministry of |
Defence. Colonel Drobyshevskiy further advocates the creation of an |
information warfare system. (Svobodnaya Pressa, 2009) |
Another clue to the future of Russian cyber warfare is the development of |
a new information warfare defensive strategy by the Russian Armed Forces |
General Staff. Colonel-General Anatoliy Nogovitsyn, Deputy Chief of the |
General Staff, stated that leading world powers will be able to conduct fullscale information warfare and that Russia must be prepared (Usov, 2009). |
General Nogovitsyn believes that Russia will be involved in a large-scale |
information war within two to three years that will be fought in the cyber |
world (Litovkin, 2009). |
The existence of hackers that support the Russian government and |
information specialists within the Russian government have created an |
asset that will be used during future cyber conflicts. The Russian |
government |
s emphasis on developing cyber strategies will enable Russia to |
be prepared for future cyber conflict. |
11. Countermeasures |
We need to examine what can be done to counter cyber crimes and protect |
a nation |
s IT structure. Cyber countermeasures can be taken at the |
international level, followed by cyber defences at the national level, and |
Volume 11, 2009 |
Baltic Security & Defence Review |
ending with actions that an individual computer user can make to improve |
cyber defence. |
The International Telecommunication Union (ITU), the organization |
within the UN that is responsible for the international oversight of the |
world |
s telephone system, is developing a system for oversight of the |
internet. The ITU is working towards a convention against cybercrime that |
will provide international cooperation on issues concerning internet |
communications (Schrank, 2007). Members of the international |
community will need to work together in order to track and prosecute |
cyber criminals that operate outside of the country that is being attacked. |
Nations will also have to work together to share technical data to maintain |
cyber defences to keep up with the newest and ever changing cyber |
attacks. Hackers routinely share information on new techniques that can |
penetrate IT defence structures. Nations need to do the same to protect |
their own IT infrastructure, the same IT structure that affects the entire |
globe (Lipson, 2002:47-48). |
Individual countries can improve their cyber defences within their own |
boundaries which would also improve the cyber security of the |
international IT system. Countries can make laws making cyber crimes |
illegal with punishments and programs that will deter potential cyber |
criminals. Governments can create a system that increases co-operation |
between the government, businesses, and academic institutions in order to |
improve their cyber defences. This co-operation could lead to an IT |
infrastructure that is resilient and able to withstand and recover from a |
cyber attack with little or no permanent damage to a country |
s IT structure. |
(Schrank, 2007) |
In 8th section the computer user was identified as the weakest link in an IT |
system. Some individual countermeasures are easy to accomplish for any |
computer user. Actions like keeping antivirus and anti-spyware software up |
to date along with updating your web browser and operating system can |
greatly enhance your own computer security. Even following safe |
computer practices of not opening unknown attachments on emails that |
may carry viruses or malware are very instrumental in making the cyber |
environment more secure (Secure Works Press Release, 2008). The U.S. |
Department of Homeland Security (DHS) has tips for computer users |
posted on their website to increase internet security. The main points of |
the DHS website are to promote personal responsibility for increasing |
Baltic Security & Defence Review |
Volume 11, 2009 |
cyber security and to promote best practices for safe computer usage. The |
best practices that DHS advertises are to make cyber security a habit by |
following three core practices. The three core practices are to |
install antivirus and anti-spyware programs and keep them up to date, install a |
firewall and keep it properly configured, and to regularly install updates on |
your computer |
s operating system |
(Homeland Security, 2008). Computer |
users are the first line of defence in cyber security and their actions can |
help protect the cyber infrastructure that is used by all. |
Conclusion |
The international system is lacking in its ability to effectively manage issues |
of cyber security. The Russian Federation is perceived by the international |
community as a country that engages in or supports groups that are |
involved in cyber crime. International and regional organizations along |
with countries that interact with the Russian Federation have to deal with a |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.